Results 41 to 50 of about 371 (175)

Improved lattice enumeration algorithms by primal and dual reordering methods

open access: yesIET Information Security, Volume 17, Issue 1, Page 35-45, January 2023., 2023
Abstract The security of lattice‐based cryptosystems is generally based on the hardness of the Shortest Vector Problem (SVP). The original enumeration (ENUM) algorithm solving SVP runs in exponential time due to the exhaustive search, which is used as a subroutine for the block Korkin–Zolotarev (BKZ) algorithm.
Kazuki Yamamura   +2 more
wiley   +1 more source

Improved lattice‐based mix‐nets for electronic voting

open access: yesIET Information Security, Volume 17, Issue 1, Page 18-34, January 2023., 2023
Abstract Mix‐networks were first proposed by Chaum in the late 1970s–early 1980s as a general tool for building anonymous communication systems. Classical mix‐net implementations rely on standard public key primitives (e.g., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built.
Valeh Farzaliyev   +2 more
wiley   +1 more source

Crystals‐Dilithium on ARMv8

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Crystals‐Dilithium is one of the digital‐signature algorithms in NIST’s ongoing post‐quantum cryptography (PQC) standardization final round. Security and computational efficiency concerning software and hardware implementations are the primary criteria for PQC standardization.
Youngbeom Kim   +4 more
wiley   +1 more source

A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The electronic reporting system can alleviate the problems in terms of efficiency, content confidentiality, and reporter privacy imposed in the traditional reporting system. Relying on anonymity, the privacy of reporters can be protected, but the authentication of reporters with fake names should also be maintained.
Huiying Zou   +4 more
wiley   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Visual representation of post-quantum cryptographic algorithm Kyber [PDF]

open access: yesTehnika
Cryptographic algorithms form the foundation of protocols and applications that ensure confidentiality, integrity, and availability in modern information and communication technologies.
Vujnić Aleksa D.   +2 more
doaj   +1 more source

Kyber AHE: An Easy-to-Implement Additive Homomorphic Encryption Scheme Based on Kyber and Its Application in Biometric Template Protection

open access: yesMathematics
Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the addition ...
Roberto Román   +2 more
doaj   +1 more source

تسریع زمان اجرای الگوریتم رمزنگاری پساکوانتوم Crystals-Kyber روی FPGA [PDF]

open access: yesپدافند الکترونیکی و سایبری, 2023
کامپیوترهای کوانتومی توان محاسباتی خیلی بیشتری نسبت به کامپیوترهای کلاسیک دارند و این مسئله باعث ایجاد چالش در حوزه رمزنگاری کلید عمومی شده است، به طوری که پیش‌بینی می‌شود در آینده کامپیوترهای کوانتومی به اندازه‌ای قدرتمند شوند که بتوانند الگوریتم‌های ...
محمد غفاری   +2 more
doaj  

FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber

open access: yesTongxin xuebao, 2022
In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and ...
Bin LI   +3 more
doaj   +2 more sources

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy