Abstract: This paper compares the performance of activation function hardware under exponential function approximation techniques. The activation function is a key component of deep neural networks, ...
Abstract: The ML-KEM post-quantum cryptography (PQC) scheme requires matrix-vector polynomial multiplication and polynomial arithmetic operations in the number theoretic transform (NTT) domain. Prior ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results