Explore >> Select a destination


You are here

blog.lambdaclass.com
| | www.rareskills.io
3.9 parsecs away

Travel
| | This article is explains how to turn a set of arithmetic constraints into Rank One Constraint System (R1CS).
| | ajcr.github.io
6.8 parsecs away

Travel
| | Haphazard investigations
| | cronokirby.com
4.5 parsecs away

Travel
| | - Read more: https://cronokirby.com/posts/2022/09/notes-on-stark-arithmetization/
| | www.jeremykun.com
26.2 parsecs away

Travel
| Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key.