The Beginner’s Textbook for Fully Homomorphic Encryption Authors: Ronny Ko | Published: 2025-03-07 | Updated: 2025-05-20 Polynomial ApproximationMathematical AnalysisCryptography 2025.03.07 2025.05.27 Literature Database
RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27 Trigger DetectionMathematical AnalysisAdversarial Learning 2018.10.28 2025.05.28 Literature Database
Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice? Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05 Experimental ValidationMathematical AnalysisMachine Learning Algorithm 2018.01.05 2025.05.28 Literature Database
Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16 Privacy Protection MethodAttack MethodMathematical Analysis 2017.08.30 2025.05.28 Literature Database
Secure Search on the Cloud via Coresets and Sketches Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19 Privacy Protection MethodSecure Arithmetic ComputationMathematical Analysis 2017.08.19 2025.05.28 Literature Database