|
You are here |
awwalker.com | ||
| | | | |
www.vanimpe.eu
|
|
| | | | | Cryptography Introduction Cheatsheet, Private Communications in a Public World | |
| | | | |
www.jeremykun.com
|
|
| | | | | Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key. | |
| | | | |
www.ayoub-benaissa.com
|
|
| | | | | This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic. | |
| | | | |
www.dr-josiah.com
|
|
| | | Josiah Carlson talks about Redis, Python, and other technology topics. | ||