Results 1 to 10 of about 47 (34)

The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes

open access: yesJournal of Mathematical Cryptology, 2021
Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition.
Bhattacharjee Arghya   +3 more
doaj   +1 more source

Facilitating caregiver‐child interactions in home visiting: A qualitative observational study

open access: yesInfant Mental Health Journal: Infancy and Early Childhood, Volume 44, Issue 4, Page 526-540, July 2023., 2023
Abstract Facilitating parent‐child interactions is a key component of evidence‐based early childhood home visiting programs. Several observational measures have been created to effectively capture home visiting activities from an operationalized perspective.
Luke Timothy Huber   +3 more
wiley   +1 more source

The influence of clinical severity and topical antimicrobial treatment on bacteriological culture and the microbiota of equine pastern dermatitis

open access: yesVeterinary Dermatology, Volume 32, Issue 2, Page 173-e41, April 2021., 2021
Background –Equine pastern dermatitis (EPD) is a common dermatological problem in horses, yet its aetiology and pathogenesis are poorly understood. Objectives –This study aimed to investigate the effects of lesion severity and topical antimicrobial treatment on bacterial flora of EPD‐affected skin.
Daphne B. Sangiorgio   +6 more
wiley   +1 more source

On computing factors of cyclotomic polynomials [PDF]

open access: yesarXiv.org, 1993
For odd square-free n > 1 the cyclotomic polynomial Φn(x) satisfies the identity of Gauss 4Φn(x) = An − (−1)(n−1)/2nB2 n. A similar identity of Aurifeuille, Le Lasseur and Lucas is Φn((−1)x) = C n − nxD n or, in the case that n is even and square-free ...
Richard P. Brent
semanticscholar   +1 more source

DLP in semigroups: Algorithms and lower bounds

open access: yesJournal of Mathematical Cryptology, 2022
The discrete logarithm problem (DLP) in semigroups has attracted some interests and serves as the foundation of many cryptographic schemes. In this work, we study algorithms and lower bounds for DLP in semigroups.
Han Jiao, Zhuang Jincheng
doaj   +1 more source

The polynomial learning with errors problem and the smearing condition

open access: yesJournal of Mathematical Cryptology, 2022
As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and ...
Babinkostova Liljana   +4 more
doaj   +1 more source

Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem

open access: yesJournal of Mathematical Cryptology, 2020
The approximate greatest common divisor problem (ACD) and its variants have been used to construct many cryptographic primitives. In particular, the variants of the ACD problem based on Chinese remainder theorem (CRT) are being used in the constructions ...
Cheon Jung Hee   +4 more
doaj   +1 more source

A trade-off between classical and quantum circuit size for an attack against CSIDH

open access: yesJournal of Mathematical Cryptology, 2020
We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order 𝒪).
Biasse Jean-François   +4 more
doaj   +1 more source

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

open access: yesJournal of Mathematical Cryptology, 2020
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Boneh Dan   +7 more
doaj   +1 more source

Efficacy study of a topical treatment with a plant extract with antibiofilm activities using an in vivo model of canine superficial pyoderma

open access: yesVeterinary Dermatology, Volume 31, Issue 2, Page 86-e8, April 2020., 2020
Background Canine pyoderma is a common skin infection caused predominantly by staphylococcal bacteria. Because of increasing rates of antimicrobial resistance in bacterial isolates, there is an urgent need for alternative or supplementary treatment options.
Wolfgang Bäumer   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy