60752 research outputs found
Sort by
PaCo: Bootstrapping for CKKS via Partial CoeffToSlot
peer reviewedWe introduce PaCo, a novel and efficient bootstrapping procedure for the CKKS homomorphic encryption scheme, where PaCo stands for “(Bootstrapping via) Partial CoeffToSlot”. At a high level, PaCo reformulates the CKKS decryption equation in terms of blind rotations and modular additions. This reformulated decryption circuit is then evaluated homomorphically within the CKKS framework. Our approach makes use of the circle group in the complex plane to simulate modular additions via complex multiplication, and utilizes alternative polynomial ring structures to support blind rotations. These ring structures are enabled by a variant of the CoeffToSlot operation, which we call a partial CoeffToSlot. This yields a new bootstrapping approach within CKKS, achieving a computational complexity which is logarithmic in the number of complex slots. We further introduce a parallelized variant that enables bootstrapping over all CKKS slots with enhanced throughput, highlighting PaCo’s suitability for practical and large-scale homomorphic applications. In addition to the bootstrapping technique itself, we develop several supporting tools — particularly in the context of bit-reversing and alternative ring structures for CKKS — which can be of independent interest to the community. Finally, a proof-of-concept implementation confirms that PaCo achieves performance competitive with state-of-the-art methods for CKKS bootstrapping
Cleaning Maintenance Logs with LLM Agents for Improved Predictive Maintenance
peer reviewedEconomic constraints, limited availability of datasets for reproducibility
and shortages of specialized expertise have long
been recognized as key challenges to the adoption and advancement
of predictive maintenance (PdM) in the automotive
sector. Recent progress in large language models (LLMs)
presents an opportunity to overcome these barriers and speed
up the transition of PdM from research to industrial practice.
Under these conditions, we explore the potential of LLMbased
agents to support PdM cleaning pipelines. Specifically,
we focus on maintenance logs, a critical data source
for training well-performing machine learning (ML) models,
but one often affected by errors such as typos, missing
fields, near-duplicate entries, and incorrect dates. We evaluate
LLM agents on cleaning tasks involving six distinct types
of noise. Our findings show that LLMs are effective at handling
generic cleaning tasks and offer a promising foundation
for future industrial applications. While domain-specific errors
remain challenging, these results highlight the potential
for further improvements through specialized training and enhanced
agentic capabilities
From the 19th to the 21st Century: Paradigmatic Shifts in the Luxembourgs Economy
peer reviewedBeginning in the 20th century, Luxembourg experienced several periods of transition. The largely agriculture-based economy became industrialized, driven by a powerful steel industry which remained the dominant sector from the immediate post-Second World War years to the mid-1970s. In 1974 the steel industry began to decline, marking the end of the ‘Trente Glorieuses’. Luxembourg was forced to implement considerable structural changes and embarked on its second major transition, from an industrial economy to a service economy based on the financial sector. The third is the transition to the knowledge economy, which is currently in full swing in LuxembourgCompetition, convergence, harmonisation – a comparative analysis of taxation in the Benelux states” (FISCOLUX: 2019-2023
XROV: An Immersive eXtended Reality (XR) Interface for Lunar Rover Mission Control
peer reviewedThe Moon is once again a focal point for space exploration, with interest extending from space agencies to private companies. Recent discoveries of lunar resources and the potential to develop a lunar economy based on in-Situ Resource Utilisation (ISRU) have accelerated the development of advanced robotic technologies. This is clear in the increasing number of missions, with three landers deployed in 2024, and an additional three as of March 2025. To ensure successful robotic lunar operations, reliable human supervision and control are essential, supported by advanced systems that enhance operator situational awareness. This paper presents the eXtended Reality interface for lunar ROVer Mission Control (XROV) - a novel system designed to enable immersive teleoperation and monitoring of lunar rovers. XROV provides operators with an online 3D virtual reconstruction of the rover’s lunar surroundings using on-board sensor data, allowing them to visualize regions of interest from multiple perspectives and identify risks such as wheel-ground interactions and hazards with Artificial Intelligence (AI). Additionally, a Graphical User Interface (GUI) is proposed to improve human-robot interaction, displaying critical information such as rock coordinates, battery levels, and terrain elevation. XROV employs a human-in-the-loop approach, which is essential for ensuring adaptability and informed decision making during AI-assisted rover missions. The system was designed, implemented, and tested at the Lunalab, University of Luxembourg, where two experiments were conducted with different operators and real rovers. The results demonstrate the effectiveness of XROV in improving situational awareness, control, and user experience, making it a valuable tool for teleoperating rovers in hazardous and unexplored lunar environments
Privacy evaluation of the European Digital Identity Wallet's Architecture and Reference Framework
peer reviewedDigital identity wallets promise significant advancements in digital identity management by offering users a high degree of convenience, security, and control over their data disclosure. However, there is also criticism regarding their privacy guarantees, especially when used in regulated use cases that require high levels of assurance on the correctness and binding of a legal identity. In this paper, we present a comprehensive privacy model and analysis of one of the most prominent digital wallets – the European Digital Identity Wallet (EUDIW) – as specified by the Architecture and Reference Framework (ARF) and the eIDAS 2.0 regulation. We employ a suite of qualitative privacy risk assessment methods to systematically map and evaluate information flows in three key use cases. Our analysis identifies multiple privacy risks – including linkability, identifiability, and excessive attribute data disclosure – and reveals that although the ARF is designed to comply with privacy-by-design principles, inherent design choices, such as the reliance on SD-JWT and mDOC data formats, as well as the concept of a Wallet Unit Attestation (WUA), retain risks to user privacy. Building on our findings, we then highlight how advanced Privacy-Enhancing Technologies (PETs), such as (general-purpose) Zero-Knowledge Proofs (ZKPs), can reduce or mitigate some of these risks
From at Least n/3 to at Most 3n: Correcting the Algebraic Immunity of the Hidden Weight Bit Function: Algebraic Immunity Upper Bounds on Weightwise Degree-d Functions and Their Implications
peer reviewedWeightwise degree-d (WWdd) functions are Boolean functions that, on each set of fixed Hamming weight, coincide with a function of degree at most d. They generalize both symmetric functions and the Hidden Weight Bit Function (HWBF), which has been studied in cryptography for its favorable properties. In this work, we establish a general upper bound on the algebraic immunity of such functions, a key security parameter against algebraic attacks on stream ciphers like filtered Linear Feedback Shift Registers (LFSRs). We construct explicit low-degree annihilators for WWdd functions with small d, and show how to generalize these constructions. As an application, we prove that the algebraic immunity of the HWBF is upper bounded by 3n disproving a result from 2011 that claimed a lower bound of n/3. We then apply our technique to several generalizations of the HWBF proposed since 2021 for homomorphically friendly constructions and LFSR-based ciphers, refining or refuting results from six prior works
Die Waffe Newton. Mit dem leeren Raum gegen die Feinde der Aufklärung
editorial reviewedWie konnte Isaac Newton im Laufe des 18. Jahrhunderts zu einem Heiligen des Aufklärungszeitalters werden, obwohl sein Werk bei seinem Tod 1727 in Frankreich nur unter Vorbehalt aufgenommen wurde? Christian Reidenbach geht in „Die Waffe Newton“ diesem Paradox nach und erzählt die Erfolgsgeschichte einer Kampagne der Wissenschaftsvermittlung.
Ihre Protagonisten sind – mit Émilie du Châtelet als gemeinsamem Bezugspunkt – die Aufklärer Voltaire, Maupertuis und Algarotti, die sich gegen den Widerstand eines cartesianisch geprägten akademischen Establishments behaupten. Unter ihrer Feder wird Newtons Lehre von der universellen Gravitation im leeren Raum zum Treiber gesellschaftlicher Emanzipation.
Von hier aus schlägt „Die Waffe Newton“ den Bogen zu Kant: Mit Newton als Referenzgröße verbinden sich in seiner „Allgemeinen Naturgeschichte“ empirische Beobachtung, rationales Denken und poetische Imagination zu einer großen Synthese des unendlichen Weltgebäudes – und leiten zugleich den Übergang zu einer neuen, kritisch-reflektierten Bestimmung des Raums und der menschlichen Freiheit ein.
Ein Buch, das zeigt, wie aus Naturwissenschaft Weltanschauung wird und wie eine Idee die geistige Landschaft Europas verändert