check circuit
Recently Published Documents


TOTAL DOCUMENTS

5
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Hangchao Ding ◽  
Han Jiang ◽  
Qiuliang Xu

We propose postquantum universal composable (UC) cut-and-choose oblivious transfer (CCOT) protocol under the malicious adversary model. In secure two-party computation, we construct s copies’ garbled circuits, including half check circuit and half evaluation circuit. The sender can transfer the key to the receiver by CCOT protocol. Compared to PVW-OT [6] framework, we invoke WQ-OT [35] framework with reusability of common random string ( crs ) and better security. Relying on LWE’s assumption and the property of the Rounding function, we construct an UC-CCOT protocol, which can resist quantum attack in secure two-party computation.


2014 ◽  
Vol 21 (11) ◽  
pp. 1380-1384 ◽  
Author(s):  
Carlo Condo ◽  
Maurizio Martina ◽  
Gianluca Piccinini ◽  
Guido Masera

Author(s):  
Zhou Xue-song ◽  
Zhou Xuan-zheng ◽  
Ma You-jie ◽  
Gu Hai-qing ◽  
Liu Xin ◽  
...  

2008 ◽  
Vol 17 (05) ◽  
pp. 773-783 ◽  
Author(s):  
HEESUNG LEE ◽  
EUNTAI KIM

Error correcting codes (ECCs) are commonly used as a protection against the soft errors. Single error correcting and double error detecting (SEC–DED) codes are generally used for this purpose. Such circuits are widely used in industry in all types of memory, including caches and embedded memory. In this paper, a new genetic design for ECC is proposed to perform SEC–DED in the memory check circuit. The design is aimed at finding the implementation of ECC which consumes minimal power. We formulate the ECC design into a permutable optimization problem and employ special genetic operators appropriate for this formulation. Experiments are performed to demonstrate the performance of the proposed method.


2002 ◽  
Vol 15 (1) ◽  
pp. 24-28 ◽  
Author(s):  
T.C. Nguyen ◽  
S. Chan ◽  
R. Bailey ◽  
T. Nguyen

Sign in / Sign up

Export Citation Format

Share Document