Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,985,185 papers from all fields of science
Search
Sign In
Create Free Account
Learning with errors
Known as:
LWE
, Learning with error
, R-LWE
Learning with errors (LWE) is a problem in machine learning that is conjectured to be hard to solve. Introduced by Oded Regev in 2005, it is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Chosen-ciphertext attack
Computational hardness assumption
Homomorphic encryption
Ideal lattice cryptography
Expand
Broader (2)
Cryptography
Machine learning
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
IACR Cryptology ePrint Archive
2019
Corpus ID: 67752874
We provide a reduction of the Ring-LWE problem to Ring-LWE problems in subrings, in the presence of samples of a restricted form…
Expand
2019
2019
Integer Version of Ring-LWE and its Applications
Chunsheng Gu
IACR Cryptology ePrint Archive
2019
Corpus ID: 8088096
In this work, we introduce an integer version of ring-LWE (I-RLWE) over the polynomial rings and present a public key encryption…
Expand
2017
2017
Practical Implementation of Lattice-Based Program Obfuscators for Point Functions
L. Bahler
,
G. D. Crescenzo
,
Y. Polyakov
,
Kurt Rohloff
,
David Cousins
International Symposium on High Performance…
2017
Corpus ID: 21640666
Lattice-based cryptography has recently produced several time-efficient cryptosystems that are provably secure under assumptions…
Expand
2016
2016
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
P. Ananth
,
Aayush Jain
,
M. Naor
,
A. Sahai
,
E. Yogev
IACR Cryptology ePrint Archive
2016
Corpus ID: 18377411
Over the last few years a new breed of cryptographic primitives has arisen: on one hand they have previously unimagined utility…
Expand
2015
2015
Secure Image processing using LWE based Homomorphic encryption
RatnaKumari Challa
,
Kakinada Andhrapradesh
,
India G Vijayakumari
,
Hyderabad Telangana
,
Sunny B
,
India
IEEE International Conference on Electrical…
2015
Corpus ID: 11574934
The demand for privacy is more important consideration for digital data maintenance and handling in the systems. However, the…
Expand
2015
2015
Efficient Secure Outsourcing of Genome-Wide Association Studies
Wen-jie Lu
,
Yoshiji Yamada
,
Jun Sakuma
IEEE Security and Privacy Workshops
2015
Corpus ID: 16881601
A genome-wide association study aimed at finding genetic variations associated with a particular disease is a common approach…
Expand
2013
2013
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems
Alexandre Duc
,
S. Vaudenay
International Conference on Cryptology in Africa
2013
Corpus ID: 7194512
We propose HELEN, a code-based public-key cryptosystem whose security is based on the hardness of the Learning from Parity with…
Expand
2013
2013
Detect Zero by Using Symmetric Homomorphic Encryption
D. Guan
,
Chen-Yu Tsai
,
E. Zhuang
Eighth Asia Joint Conference on Information…
2013
Corpus ID: 17027075
First, we prove that a homomorphic encryption with a function of detecting zero, detecting equality, comparing the value or…
Expand
2012
2012
The Implemention and Application of Fully Homomorphic Encryption Scheme
Jing-Li Han
,
Ming-How Yang
,
Cai-Ling Wang
,
Shan-Shan Xu
Second International Conference on…
2012
Corpus ID: 10357800
Fully homomorphic encryption scheme (FHE) has numerous applications, especially in the cloud computation. Recently, FHE has been…
Expand
Highly Cited
2007
Highly Cited
2007
Anti‐cyclonic eddies northwest of Luzon in summer–fall observed by satellite altimeters
D. Yuan
,
W. Han
,
D. Hu
2007
Corpus ID: 55870949
Anti‐cyclonic eddies northwest of Luzon of the Philippines in summer‐fall are identified in the merged data products of satellite…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE