Results 61 to 70 of about 10,420 (190)
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah +3 more
doaj +1 more source
Efficient Side-Channel Protections of ARX Ciphers
The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal addition operation.
Bernhard Jungk +2 more
doaj +1 more source
Mucosa‐associated invariant T (MAIT) cells are an evolutionarily conserved class of innate‐like T lymphocytes that rely on MR1 molecules to recognize microbial metabolites and play a central role in immune surveillance and inflammatory regulation.
Cheng Zhu +10 more
wiley +1 more source
This study was designed to explore the pharmacological effects of the methanol extract derived from S. grande leaves (MESG) on Swiss albino mice. The extract displayed significant anxiolytic, sedative, and antipyretic effects with moderate antidepressant effects.
Md. Jahirul Islam Mamun +4 more
wiley +1 more source
Polynomial Multiplication in NTRU Prime
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim +10 more
doaj +3 more sources
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein +9 more
doaj +1 more source
IOT based Energy Meter Monitoring using ARM Cortex M4 with Android Application
Internet of Things (IOT) aims at interfacing different gadgets to the internet web – encouraging human-machine and machine-machine connections offering superior security, console and effectiveness. The concept of IOT is utilized in this model, remote monitoring of energy meter which is intended to overcome the issues in existing Automatic Meter Reading
U. B., Rashmi M.
openaire +1 more source
Security for the Industrial IoT: The Case for Information-Centric Networking
Industrial production plants traditionally include sensors for monitoring or documenting processes, and actuators for enabling corrective actions in cases of misconfigurations, failures, or dangerous events.
Frey, Michael +7 more
core +1 more source
Stroke is a leading cause of death and disability worldwide, often due the inadequate restoration of cerebral blood flow following vascular recanalization. Our study demonstrates that a simple technique called RLIPC (remote limb ischemic preconditioning), which involves briefly restricting blood flow in a limb, protects the brain during a stroke by ...
Chaoran Dou +8 more
wiley +1 more source
Novel ultrasonic distance measuring system based on correlation method
This paper presents an innovative method for measuring the time delay of ultrasonic waves. Pulse methods used in the previous studies was characterized by latency. The method of phase correlation, presented in this article is free from this disadvantages.
Gądek K., Jaraczewski M.
doaj +1 more source

