Explore >> Select a destination


You are here

www.ayoub-benaissa.com
| | www.jeremykun.com
9.3 parsecs away

Travel
| | This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes. The basis for many FHE schemes, as well as other privacy-preserving protocols, is the Learning With Errors (LWE) problem.
| | jeremykun.wordpress.com
7.8 parsecs away

Travel
| | This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes....
| | programmathically.com
9.2 parsecs away

Travel
| | Sharing is caringTweetIn this post, we develop an understanding of why gradients can vanish or explode when training deep neural networks. Furthermore, we look at some strategies for avoiding exploding and vanishing gradients. The vanishing gradient problem describes a situation encountered in the training of neural networks where the gradients used to update the weights []
| | scottarc.blog
77.8 parsecs away

Travel
| This isn't (necessarily) a security vulnerability; merely an observation that I don't think has been articulated adequately within the cryptography community. I thought it would be worth capturing somewhere public so that others can benefit from a small insight when designing cryptosystems. Background Once upon a time, there was Symmetric Encryption, which provided confidentiality, but...