Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

High-dimensional Gaussian sampling: a review and a unifying approach based on a stochastic proximal point algorithm

M Vono, N Dobigeon, P Chainais - SIAM Review, 2022 - SIAM
Efficient sampling from a high-dimensional Gaussian distribution is an old but high-stakes
issue. Vanilla Cholesky samplers imply a computational cost and memory requirements that …

[КНИГА][B] Computer vision: algorithms and applications

R Szeliski - 2022 - books.google.com
Humans perceive the three-dimensional structure of the world with apparent ease. However,
despite all of the recent advances in computer vision research, the dream of having a …

[КНИГА][B] Scientific computing: an introductory survey, revised second edition

MT Heath - 2018 - SIAM
This book presents a broad overview of numerical methods for students and professionals in
computationally oriented disciplines who need to solve mathematical problems. It differs …

Using machine learning to detect events in eye-tracking data

R Zemblys, DC Niehorster, O Komogortsev… - Behavior research …, 2018 - Springer
Event detection is a challenging stage in eye movement data analysis. A major drawback of
current event detection methods is that parameters have to be adjusted based on eye …

Uncertainty quantification via a memristor Bayesian deep neural network for risk-sensitive reinforcement learning

Y Lin, Q Zhang, B Gao, J Tang, P Yao, C Li… - Nature Machine …, 2023 - nature.com
Many advanced artificial intelligence tasks, such as policy optimization, decision making and
autonomous navigation, demand high-bandwidth data transfer and probabilistic computing …

[HTML][HTML] 3D multi-layer grain structure simulation of powder bed fusion additive manufacturing

JA Koepf, MR Gotterbarm, M Markl, C Körner - Acta Materialia, 2018 - Elsevier
In powder bed fusion (PBF) additive manufacturing, powder layers are locally melted with a
laser or an electron beam to build a component. Hatching strategies and beam parameters …

[КНИГА][B] Tools for computational finance

R Seydel, R Seydel - 2006 - Springer
Universitext is a series of textbooks that presents material from a wide variety of
mathematical disciplines at master's level and beyond. The books, often well class-tested by …

Subspace iteration randomization and singular value problems

M Gu - SIAM Journal on Scientific Computing, 2015 - SIAM
A classical problem in matrix computations is the efficient and reliable approximation of a
given matrix by a matrix of lower rank. The truncated singular value decomposition (SVD) is …

Towards practical lattice-based public-key encryption on reconfigurable hardware

T Pöppelmann, T Güneysu - International Conference on Selected Areas …, 2013 - Springer
With this work we provide further evidence that lattice-based cryptography is a promising
and efficient alternative to secure embedded applications. So far it is known for solid security …