39 research outputs found
Ring-LWE:applications to cryptography and their efficient realization
© Springer International Publishing AG 2016. The persistent progress of quantum computing with algorithms of Shor and Proos and Zalka has put our present RSA and ECC based public key cryptosystems at peril. There is a flurry of activity in cryptographic research community to replace classical cryptography schemes with their post-quantum counterparts. The learning with errors problem introduced by Oded Regev offers a way to design secure cryptography schemes in the post-quantum world. Later for efficiency LWE was adapted for ring polynomials known as Ring-LWE. In this paper we discuss some of these ring-LWE based schemes that have been designed. We have also drawn comparisons of different implementations of those schemes to illustrate their evolution from theoretical proposals to practically feasible schemes
Comparative chromosome painting discloses homologous Segments in distantly related mammals
Comparative chromosome painting, termed ZOO-FISH, using DNA libraries from flow
sorted human chromosomes 1,16,17 and X, and mouse chromosome 11 discloses the
presence of syntenic groups in distantly related mammalian Orders ranging from
primates (Homo sapiens), rodents (Mus musculus), even-toed ungulates (Muntiacus
muntjak vaginalis and Muntiacus reevesi) and whales (Balaenoptera physalus). These
mammalian Orders have evolved separately for 55-80 million years (Myr). We conclude
that ZOO-FISH can be used to generate comparative chromosome maps of a large
number of mammalian species
Managerial power in the German model: the case of Bertelsmann and the antecedents of neoliberalism
Our article extends the research on authoritarian neoliberalism to Germany, through a history of the Bertelsmann media corporation â sponsor and namesake of Germanyâs most influential neoliberal think-tank. Our article makes three conceptual moves. Firstly, we argue that conceptualizing German neoliberalism in terms of an âordoliberal paradigmâ is of limited use in explaining the rise and fall of Germanyâs distinctive socio-economic model (Modell Deutschland). Instead, we locate the origins of authoritarian tendencies in the corporate power exercised by managers rather than in the power of state-backed markets imagined by ordoliberals. Secondly, we focus on the managerial innovations of Bertelsmann as a key actor enmeshed with Modell Deutschland. We show that the adaptation of business management practices of an endogenous âCologne Schoolâ empowered Bertelsmannâs postwar managers to overcome existential crises and financial constraints despite being excluded from Germanyâs corporate support network. Thirdly, we argue that their further development in the 1970s also enabled Bertelsmann to curtail and circumvent the forms of labour representation associated with Modell Deutschland. Inspired by cybernetic management theories that it used to limit and control rather than revive market competition among its workforce, Bertelsmann began to act and think outside the postwar settlement between capital and labour before the settlementâs hotly-debated demise since the 1990s
Compact Ring-LWE Cryptoprocessor
Abstract. In this paper we propose an efficient and compact processor for a ring-LWE based encryption scheme. We present three optimizations for the Num-ber Theoretic Transform (NTT) used for polynomial multiplication: we avoid pre-processing in the negative wrapped convolution by merging it with the main algo-rithm, we reduce the fixed computation cost of the twiddle factors and propose an advanced memory access scheme. These optimization techniques reduce both the cycle and memory requirements. Finally, we also propose an optimization of the ring-LWE encryption system that reduces the number of NTT operations from five to four resulting in a 20 % speed-up. We use these computational optimiza-tions along with several architectural optimizations to design an instruction-set ring-LWE cryptoprocessor. For dimension 256, our processor performs encryp-tion/decryption operations in 20/9 ”s on a Virtex 6 FPGA and only requires 1349 LUTs, 860 FFs, 1 DSP-MULT and 2 BRAMs. Similarly for dimension 512, the processor takes 48/21 ”s for performing encryption/decryption operations and only requires 1536 LUTs, 953 FFs, 1 DSP-MULT and 3 BRAMs. Our pro-cessors are therefore more than three times smaller than the current state of the art hardware implementations, whilst running somewhat faster
Privacy-Enhanced Machine Learning with Functional Encryption
Functional encryption is a generalization of public-key encryption in which possessing a secret functional key allows one to learn a function of what the ciphertext is encrypting. This paper introduces the first fully-fledged open source cryptographic libraries for functional encryption. It also presents how functional encryption can be used to build efficient privacy-enhanced machine learning models and it provides an implementation of three prediction services that can be applied on the encrypted data. Finally, the paper discusses the advantages and disadvantages of the alternative approach for building privacy-enhanced machine learning models by using homomorphic encryption
Soft X Ray Lithography for High Aspect Ratio Sub Micrometer Structures
Soft x ray lithography is a promising micro nano fabrication process for patterning of ultra precise, low and high aspect ratio micro and nanostructures [1 5]. Research presented in this paper builds upon a new negative tone, epoxy based x ray resist, mr X, which offers comparable contrast to PMMA gt; 3 at a factor of 20x higher sensitivity [6]. Using a 1 amp; 956;m thick SiN membrane mask with a 1 amp; 956;m thick Au absorber, patterns were transferred into 10 amp; 956;m thick resist using the soft exposure mode at the BESSY II WLS beamline. With typical exposure times of a few minutes very precise grating and filter structures can be fabricated with dimensions down to about 500nm