Explore >> Select a destination


You are here

awwalker.com
| | modexp.wordpress.com
13.8 parsecs away

Travel
| | Introduction Compressed, encrypted, and random data all contain a high amount of entropy, which is why many products use entropy analysis to detect malicious code in binaries that have never been examined before. In a previous post about masking, I suggested using a deterministic random number generator with the Fisher-Yates shuffle to try and scramble...
| | www.ayoub-benaissa.com
14.2 parsecs away

Travel
| | This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic.
| | www.jeremykun.com
13.6 parsecs away

Travel
| | Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key.
| | herbertograca.com
151.0 parsecs away

Travel
| This is a listing of articles about concepts I find essential for any developer to know. This is organized in order of most base structural concepts to most high level concepts and includes good practices, principles, and lists of articles, conference talks and books on software development. This page is in constant enhancement. Good Practices...