Explore >> Select a destination


You are here

awwalker.com
| | modexp.wordpress.com
4.9 parsecs away

Travel
| | Introduction Compressed, encrypted, and random data all contain a high amount of entropy, which is why many products use entropy analysis to detect malicious code in binaries that have never been examined before. In a previous post about masking, I suggested using a deterministic random number generator with the Fisher-Yates shuffle to try and scramble...
| | www.jeremykun.com
4.9 parsecs away

Travel
| | Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key.
| | www.ayoub-benaissa.com
5.7 parsecs away

Travel
| | This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic.
| | www.jeremykun.com
7.9 parsecs away

Travel
| The Learning With Errors problem is the basis of a few cryptosystems, and a foundation for many fully homomorphic encryption (FHE) schemes. In this article I'll describe a technique used in some of these schemes called modulus switching. In brief, an LWE sample is a vector of values in $\mathbb{Z}/q\mathbb{Z}$ for some $q$, and in LWE cryptosystems an LWE sample can be modified so that it hides a secret message $m$.