Sciweavers

CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
CG
2000
Springer
13 years 10 months ago
Chaotic attractors with cyclic symmetry revisited
Chaotic attractors generated by the iteration of polynomial functions with cyclic symmetry have been the subject of recent study. A new formulation is investigated which generates ...
Kevin C. Jones, Clifford A. Reiter
ISMVL
2006
IEEE
117views Hardware» more  ISMVL 2006»
14 years 4 months ago
Representations of Elementary Functions Using Binary Moment Diagrams
This paper considers representations for elementary functions such as polynomial, trigonometric, logarithmic, square root, and reciprocal functions. These real valued functions ar...
Tsutomu Sasao, Shinobu Nagayama
CAV
2009
Springer
132views Hardware» more  CAV 2009»
14 years 11 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas