Results 21 to 30 of about 349,531 (370)
A efficient and robust privacy-preserving framework for cross-device federated learning
To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates.
Weidong Du+5 more
doaj +1 more source
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart ...
Qi Xie+5 more
doaj +1 more source
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang+3 more
doaj +1 more source
We study the possibility of computing cryptographic primitives in a fully black-box arithmetic model over a finite field F . In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits that make ...
Benny Applebaum+2 more
openaire +2 more sources
In the User and Entity Behaviour Analytics (UEBA), unknown malicious behaviours are often difficult to be automatically detected due to the lack of labelled data.
Yi‐feng Wang, Yuan‐bo Guo, Chen Fang
doaj +1 more source
Lattice Enumeration with Discrete Pruning: Improvements, Cost Estimation and Optimal Parameters
Lattice enumeration is a linear-space algorithm for solving the shortest lattice vector problem (SVP). Extreme pruning is a practical technique for accelerating lattice enumeration, which has a mature theoretical analysis and practical implementation ...
Luan Luan+3 more
doaj +1 more source
Watermarking Is Not Cryptography [PDF]
The fields of cryptography and communications are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that permits each layer to be independently designed. It is generally agreed that watermarking, i.e.
Cox, Ingemar+2 more
openaire +5 more sources
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid
Smart grid is a combination of traditional power system engineering and information and communication technology. Smart grid provides users with convenient services through real-time data updates.
Zichao Song+5 more
doaj +1 more source
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor+2 more
semanticscholar +1 more source
Acknowledgement to Reviewers of Cryptography in 2018
Rigorous peer-review is the corner-stone of high-quality academic publishing [...]
Cryptography Editorial Office
doaj +1 more source