Explore >> Select a destination


You are here

www.jeremykun.com
| | windowsontheory.org
2.4 parsecs away

Travel
| | Guest post by Boaz Barak and Zvika Brakerski (part 2) In the previous post, we demonstrated the versatility of fully homomorphic encryption and its applicability for multiple applications. In this post we will demonstrate (not too painfully, we hope) how fully homomorphic encryption is constructed. Our goal is to present the simplest solution that (we...
| | jeremykun.com
0.3 parsecs away

Travel
| | In this article I'll derive a trick used in FHE called sample extraction. In brief, it allows one to partially convert a ciphertext in the Ring Learning With Errors (RLWE) scheme to the Learning With Errors (LWE) scheme. Here are some other articles I've written about other FHE building blocks, though they are not prerequisites...
| | awwalker.com
4.6 parsecs away

Travel
| | This post discusses the problem of computer-assisted decryption of un-parsed substitution ciphers. Sample Mathematica code is linked within.
| | thomasbandt.com
22.2 parsecs away

Travel
| Analyzing quantum computing's impact on cryptography, this post briefly discusses challenges in encryption and advances in post-quantum cryptography, emphasizing the race for quantum-resistant security.