-
WDYT? Is this publication in scope?
```
@article{Lv_2006,
author = {Lv, Jiqiang},
doi = {10.1016/j.ic.2006.04.002},
issn = {0890-5401},
journal = {Information and Computation},
month = {July},
n…
-
WDYT? Is this publication in scope?
```
@article{Mollakuqe_2024,
author = {Mollakuqe, Elissa and Parduzi, Arber and Rexhepi, Shasivar and Dimitrova, Vesna and Jakupi, Samir and Muharremi, Rilind and …
-
> **Note:** this is a bit messy, will be cleaned some time soon
## Background
- **Privacy-preserving computation**: either X of F are hidden to who computes F(X)
- **Verifiable computation**: A…
-
### **1. Quantum-Like Enhancements**
#### **a. Unitary Gate Operations**
- Implement additional quantum gates such as:
- **Pauli Gates (X, Y, Z)**: For flipping states or introducing phase sh…
-
In the hashing functions introduction, it is stated
> Hashing functions are one way functions which theoretically provide a unique output for every input. MD5, SHA-1, and other hashes which were co…
-
Investigate the possibility of JS using the SDK running in [React](https://react.dev/) to call native executable code.
This case is useful to provide hight speed and secure cryptographic support to r…
-
HE is the process of performing operations directly on encrypted data
HE is more computationally expensive, but doesn't require any interaction between parties. MPC is computationally cheaper, but …
-
When doing keygen you have to somehow do an out of band check with each party that they have the same result, or assume a PKI setup (which can be setup with an out-of-band check). A typical way to do …
-
Hello, VENumML team!
I came across VENumML, and I’m very impressed by its vision for enabling `Privacy-Preserving Machine Learning (PPML)` with `Fully Homomorphic Encryption (FHE)`. I believe this …
-
I came across this tidbit when reading the Gazelle Paper [1]
> Book-keeping: Hoisting
>
> The hoisting optimization reduces the cost of the ciphertext
> rotation when the same ciphertext must b…
j2kun updated
2 months ago