Results 41 to 50 of about 69,698 (279)

Provably secure identity-based identification and signature schemes from code assumptions. [PDF]

open access: yesPLoS ONE, 2017
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/
Bo Song, Yiming Zhao
doaj   +1 more source

Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography

open access: yes, 2018
We present a generalisation of Twisted Reed-Solomon codes containing a new large class of MDS codes. We prove that the code class contains a large subfamily that is closed under duality.
Beelen, Peter   +3 more
core   +1 more source

Crypto-Verifying Protocol Implementations in ML [PDF]

open access: yes, 2007
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core   +2 more sources

Survival Outcomes and Complications Among Canadian Children With Retinoblastoma: A Population‐Based Report From CYP‐C

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine   +14 more
wiley   +1 more source

Rank AGS Identification Scheme and Signature Scheme

open access: yesMathematics, 2023
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an
Vaishnavi Nagaraja   +6 more
doaj   +1 more source

A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]

open access: yes, 2017
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, André   +1 more
core   +1 more source

Code-based Cryptography: Lecture Notes

open access: yes, 2023
These lecture notes have been written for courses given at École normale supérieure de Lyon and summer school 2022 in post-quantum cryptography that took place in the university of Budapest. Our objective is to give a general introduction to the foundations of code-based cryptography which is currently known to be secure even against quantum ...
openaire   +2 more sources

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Health‐Related Quality of Life and Symptom Severity Among Patients With PIK3CA‐Related Overgrowth Spectrum: A Mixed‐Methods Study to Understand Real‐World Experience With Alpelisib Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background PIK3CA‐related overgrowth spectrum (PROS) includes several rare overgrowth disorders resulting from somatic gain‐of‐function mutations in PIK3CA. Despite treatment advances, including the recent approval of alpelisib for PROS in the United States, literature detailing the patient experience with PROS is limited.
Vamsi Bollu   +8 more
wiley   +1 more source

Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Considering code-based cryptography, quasi-cyclic low-density parity-check (QC-LDPC) codes are foreseen as one of the few solutions to design post-quantum cryptosystems.
Davide Zoni   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy