Results 1 to 10 of about 47 (34)
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes
Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition.
Bhattacharjee Arghya +3 more
doaj +1 more source
Facilitating caregiver‐child interactions in home visiting: A qualitative observational study
Abstract Facilitating parent‐child interactions is a key component of evidence‐based early childhood home visiting programs. Several observational measures have been created to effectively capture home visiting activities from an operationalized perspective.
Luke Timothy Huber +3 more
wiley +1 more source
Background –Equine pastern dermatitis (EPD) is a common dermatological problem in horses, yet its aetiology and pathogenesis are poorly understood. Objectives –This study aimed to investigate the effects of lesion severity and topical antimicrobial treatment on bacterial flora of EPD‐affected skin.
Daphne B. Sangiorgio +6 more
wiley +1 more source
On computing factors of cyclotomic polynomials [PDF]
For odd square-free n > 1 the cyclotomic polynomial Φn(x) satisfies the identity of Gauss 4Φn(x) = An − (−1)(n−1)/2nB2 n. A similar identity of Aurifeuille, Le Lasseur and Lucas is Φn((−1)x) = C n − nxD n or, in the case that n is even and square-free ...
Richard P. Brent
semanticscholar +1 more source
DLP in semigroups: Algorithms and lower bounds
The discrete logarithm problem (DLP) in semigroups has attracted some interests and serves as the foundation of many cryptographic schemes. In this work, we study algorithms and lower bounds for DLP in semigroups.
Han Jiao, Zhuang Jincheng
doaj +1 more source
The polynomial learning with errors problem and the smearing condition
As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and ...
Babinkostova Liljana +4 more
doaj +1 more source
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
The approximate greatest common divisor problem (ACD) and its variants have been used to construct many cryptographic primitives. In particular, the variants of the ACD problem based on Chinese remainder theorem (CRT) are being used in the constructions ...
Cheon Jung Hee +4 more
doaj +1 more source
A trade-off between classical and quantum circuit size for an attack against CSIDH
We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order 𝒪).
Biasse Jean-François +4 more
doaj +1 more source
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Boneh Dan +7 more
doaj +1 more source
Background Canine pyoderma is a common skin infection caused predominantly by staphylococcal bacteria. Because of increasing rates of antimicrobial resistance in bacterial isolates, there is an urgent need for alternative or supplementary treatment options.
Wolfgang Bäumer +2 more
wiley +1 more source

