Results 21 to 30 of about 16,532 (241)
Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loaded ...
Don Owen +6 more
doaj +1 more source
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement [PDF]
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of composability guarantees and little flexibility ...
A Barnett +16 more
core +2 more sources
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj +1 more source
Proving More Observational Equivalences with ProVerif [PDF]
This paper presents an extension of the automatic protocol verifier ProVerif in order to prove more observational equivalences. ProVerif can prove observational equivalence between processes that have the same structure but differ by the messages they ...
Blanchet, Bruno, Cheval, Vincent
core +5 more sources
Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud [PDF]
Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks.
ZHANG Weihang, ZHONG Yongyan, XIANG Yuanzhu, DING Shichan
doaj +1 more source
Analysis of Error Dependencies on Newhope
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song +5 more
doaj +1 more source
SOFIA : software and control flow integrity architecture [PDF]
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart +8 more
core +1 more source
In many universities, students’ physical ability data are collected and stored in the cloud through various sensing devices to save computational and storage costs.
You Zhao, Ye Fan, Xuefen Bian
doaj +1 more source
Discretisation and Product Distributions in Ring-LWE
A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for degree-1 and degree-2 ciphertexts in the homomorphic ...
Murphy Sean, Player Rachel
doaj +1 more source
Decentralized Inner-Product Encryption with Constant-Size Ciphertext
With the rise of technology in recent years, more people are studying distributed system architecture, such as the e-government system. The advantage of this architecture is that when a single point of failure occurs, it does not cause the system to be ...
Yi-Fan Tseng, Shih-Jie Gao
doaj +1 more source

