Results 51 to 58 of about 68 (58)

The condition number associated with ideal lattices from odd prime degree cyclic number fields

open access: yesJournal of Mathematical Cryptology
The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the ...
de Araujo Robson Ricardo
doaj   +1 more source

On the leakage-resilient key exchange

open access: yesJournal of Mathematical Cryptology, 2017
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys.
Alawatugoda Janaka
doaj   +1 more source

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

On the normality of <i>p</i>-ary bent functions. [PDF]

open access: yesCryptogr Commun, 2018
Meidl W, Pirsic Í.
europepmc   +1 more source

On tiny-probability lattice enumeration. [PDF]

open access: yesJpn J Ind Appl Math
Aono Y, Nguyen PQ.
europepmc   +1 more source

Giovani, disuguaglianze, potere. Introduzione

open access: yesArchivio Antropologico Mediterraneo
Alessandro Simonicca
doaj   +1 more source

Home - About - Disclaimer - Privacy