|
You are here |
jeremykun.com | ||
| | | | |
www.ayoub-benaissa.com
|
|
| | | | | This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic. | |
| | | | |
www.daniellowengrub.com
|
|
| | | | | [AI summary] The text discusses the implementation of homomorphic operations in the context of RLWE (Ring Learning With Errors) and GSW (Gentry-Sahai-Waters) encryption schemes. Key concepts include the use of encryptions of zero to facilitate homomorphic multiplication, the structure of GSW ciphertexts as matrices of RLWE ciphertexts, and the role of scaling factors to manage error growth during multiplication. The main goal is to enable secure computation of polynomial products without revealing the underlying plaintexts. | |
| | | | |
thenumb.at
|
|
| | | | | [AI summary] This text provides a comprehensive overview of differentiable programming, focusing on its application in machine learning and image processing. It explains the fundamentals of automatic differentiation, including forward and backward passes, and demonstrates how to implement these concepts in a custom framework. The text also discusses higher-order differentiation and its implementation in frameworks like JAX and PyTorch. A practical example is given using differentiable programming to de-blur an image, showcasing how optimization techniques like gradient descent can be applied to solve real-world problems. The text emphasizes the importance of differentiable programming in enabling efficient and flexible computation for various domains, includ... | |
| | | | |
defuse.ca
|
|
| | | [AI summary] An individual attempts to crack 6 million unsalted LinkedIn user passwords using a large dictionary attack tool to demonstrate the critical importance of salting in password security. | ||