[HTML][HTML] A literature review of fault diagnosis based on ensemble learning
Z Mian, X Deng, X Dong, Y Tian, T Cao, K Chen… - … Applications of Artificial …, 2024 - Elsevier
The accuracy of fault diagnosis is an important indicator to ensure the reliability of key
equipment systems. Ensemble learning integrates different weak learning methods to obtain …
equipment systems. Ensemble learning integrates different weak learning methods to obtain …
Conceptual review on number theoretic transform and comprehensive review on its implementations
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in develo** Post Quantum Cryptography (PQC) and Homomorphic …
increasingly important in develo** Post Quantum Cryptography (PQC) and Homomorphic …
High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …
community to the danger of attacks performed using quantum computers. All PQC schemes …
KaLi: A crystal for post-quantum security using Kyber and Dilithium
Quantum computers pose a threat to the security of communications over the internet. This
imminent risk has led to the standardization of cryptographic schemes for protection in a post …
imminent risk has led to the standardization of cryptographic schemes for protection in a post …
A high-performance domain-specific processor with matrix extension of RISC-V for module-LWE applications
Y Zhao, R **e, G **n, J Han - IEEE Transactions on Circuits and …, 2022 - ieeexplore.ieee.org
The 5G edge computing infrastructure should be empowered with quantum attack resistance
by implementing post-quantum cryptography (PQC). Among various PQC schemes, lattice …
by implementing post-quantum cryptography (PQC). Among various PQC schemes, lattice …
A highly unified reconfigurable multicore architecture to speed up NTT/INTT for homomorphic polynomial multiplication
Y Su, BL Yang, C Yang, ZP Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The ring learning with error (RLWE)-based fully homomorphic encryption (FHE) scheme has
become one of the most promising FHE schemes. However, its performance is limited by the …
become one of the most promising FHE schemes. However, its performance is limited by the …
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution
This research aims to establish a secure system for key exchange by using post-quantum
cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD) …
cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD) …
Efficient hardware arithmetic for inverted binary ring-lwe based post-quantum cryptography
Ring learning-with-errors (RLWE)-based encryption scheme is a lattice-based cryptographic
algorithm that constitutes one of the most promising candidates for Post-Quantum …
algorithm that constitutes one of the most promising candidates for Post-Quantum …
Space and time-efficient quantum multiplier in post quantum cryptography era
This paper examines the asymptotic performance of multiplication and the cost of quantum
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …
HPKA: A high-performance CRYSTALS-Kyber accelerator exploring efficient pipelining
CRYSTALS-Kyber (Kyber) was recently chosen as the first quantum resistant Key
Encapsulation Mechanism (KEM) scheme for standardisation, after three rounds of the …
Encapsulation Mechanism (KEM) scheme for standardisation, after three rounds of the …