Results 31 to 40 of about 124 (115)
A Cheating Detectable Privacy‐Preserving Data Sharing Scheme for Cloud Computing
Cloud computing provides a new, attractive paradigm for the effective sharing of storage and computing resources among global consumers. More and more enterprises have begun to enter the field of cloud computing and storing data in the cloud to facilitate the sharing data among users.
Xin Wang +5 more
wiley +1 more source
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source
Joint Scheme for Physical Layer Error Correction and Security
We present a joint scheme that combines both error correction and security at the physical layer. In conventional communication systems, error correction is carried out at the physical layer while data security is performed at an upper layer. As a result, these steps are done as separate steps.
Oluwayomi Adamo +5 more
wiley +1 more source
Blocking sets, minimal codes and trifferent codes
Abstract We prove new upper bounds on the smallest size of affine blocking sets, that is, sets of points in a finite affine space that intersect every affine subspace of a fixed codimension. We show an equivalence between affine blocking sets with respect to codimension‐2 subspaces that are generated by taking a union of lines through the origin, and ...
Anurag Bishnoi +3 more
wiley +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa +2 more
doaj +1 more source
Code based Cryptography: Classic McEliece
This article addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem. This report includes basic mathematics and fundamentals of coding theory which are useful for studying code-based cryptography.
openaire +2 more sources
Acceleration of a Classic McEliece Postquantum Cryptosystem With Cache Processing
The NIST Post-Quantum Cryptography standardization process is in its fourth round, with a first KEM standard based on LWE and three candidates based on ECCs. These primitives implementation are designed to be optimal on classical hardware architecture targets.
Cyrius Nugier, Vincent Migliore
openaire +3 more sources
Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC
The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide ...
Vaghawan Prasad Ojha +3 more
doaj +1 more source
Post-Quantum Encryption Algorithms
The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a ...
Pekarčík Peter, Chovancová Eva
doaj +1 more source

