M.A. Hasan
YOU?
Author Swipe
View article: zkMaP: Zero-Knowledge Succinct Non-Interactive Matrix Multiplication Proofs
zkMaP: Zero-Knowledge Succinct Non-Interactive Matrix Multiplication Proofs Open
We introduce zkMaP (Zero-Knowledge Succinct Non-Interactive Matrix Multiplication Proofs), a novel non-interactive zero-knowledge proof system for verifying matrix multiplication with significant improvements in efficiency and scalability.…
View article: Comparison of Outcomes and Postoperative Satisfaction Between Laser-Assisted and Conventional Open Dacryocystorhinostomy: A Prospective Comparative Study
Comparison of Outcomes and Postoperative Satisfaction Between Laser-Assisted and Conventional Open Dacryocystorhinostomy: A Prospective Comparative Study Open
Purpose: To compare the outcomes, postoperative recovery, and patient satisfaction between transcanalicular diode laser-assisted dacryocystorhinostomy (laser DCR) and conventional external dacryocystorhinostomy (external DCR) in patients w…
View article: Efficient Methods for Simultaneous Homomorphic Inversion
Efficient Methods for Simultaneous Homomorphic Inversion Open
Efficient implementation of some privacy-preserving algorithms and applications rely on efficient implementation of homomorphic inversion. For example, a recently proposed homomorphic image filtering algorithm and the privacy-preserving bo…
View article: Cloud Computing: Enhancing Security, Driving Innovation, and Shaping the Future
Cloud Computing: Enhancing Security, Driving Innovation, and Shaping the Future Open
Data can be stored and accessed from any computer using cloud computing. However, this change brings significant security issues that require solutions to guarantee data integrity, confidentiality, and availability. This review looks at th…
View article: A Hybrid Framework for Multi-Class Vehicle Detection and Tracking: Integration of Gabor Filters, YOLOv5, and Deep SORT Algorithm.
A Hybrid Framework for Multi-Class Vehicle Detection and Tracking: Integration of Gabor Filters, YOLOv5, and Deep SORT Algorithm. Open
The increasing demand for intelligent traffic monitoring systems has necessitated advancements in vehicle detection and tracking technologies. This study proposes a hybrid framework integrating Gabor filters, YOLOv5, and the Deep SORT algo…
View article: On efficient normal bases over binary fields
On efficient normal bases over binary fields Open
Binary field extensions are fundamental to many applications, such as multivariate public key cryptography, code-based cryptography, and error-correcting codes. Their implementation requires a foundation in number theory and algebraic geom…
View article: Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling Open
Strategies and their evaluations play important roles in speeding up the computation of large smooth-degree isogenies. The concept of optimal strategies for such computation was introduced by De Feo et al., and virtually all implementation…
View article: Post-Quantum Two-Party Adaptor Signature Based on Coding Theory
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory Open
An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signa…
View article: Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms Open
Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes on a conve…
View article: Random Digit Representation of Integers
Random Digit Representation of Integers Open
International audience