You are here |
www.jeremykun.com | ||
| | | |
vitalik.eth.limo
|
|
| | | | ||
| | | |
xorshammer.com
|
|
| | | | There are a number of applications of logic to ordinary mathematics, with the most coming from (I believe) model theory. One of the easiest and most striking that I know is called Ax's Theorem. Ax's Theorem: For all polynomial functions $latex f\colon \mathbb{C}^n\to \mathbb{C}^n$, if $latex f$ is injective, then $latex f$ is surjective. Very... | |
| | | |
blog.lambdaclass.com
|
|
| | | | Introduction The use of efficient zk-SNARKs (zero-knowledge succinct non-interactive arguments of knowledge) has given rise to many new and vital applications. For example, we can delegate expensive computations to untrusted servers and receive proof showing the integrity of the computations. This proof is short and can be verified much faster | |
| | | |
www.jeremykun.com
|
|
| | Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key. |