Results 21 to 30 of about 16,583 (248)
Proving More Observational Equivalences with ProVerif [PDF]
This paper presents an extension of the automatic protocol verifier ProVerif in order to prove more observational equivalences. ProVerif can prove observational equivalence between processes that have the same structure but differ by the messages they ...
Blanchet, Bruno, Cheval, Vincent
core +5 more sources
Encrypted Shared Data Spaces [PDF]
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood +13 more
core +2 more sources
Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loaded ...
Don Owen +6 more
doaj +1 more source
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj +1 more source
Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud [PDF]
Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks.
ZHANG Weihang, ZHONG Yongyan, XIANG Yuanzhu, DING Shichan
doaj +1 more source
Analysis of Error Dependencies on Newhope
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song +5 more
doaj +1 more source
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi +8 more
core +1 more source
In many universities, students’ physical ability data are collected and stored in the cloud through various sensing devices to save computational and storage costs.
You Zhao, Ye Fan, Xuefen Bian
doaj +1 more source
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate [PDF]
We consider the QC-LDPC code-based cryptosystems named LEDAcrypt, which are under consideration by NIST for the second round of the post-quantum cryptography standardization initiative. LEDAcrypt is the result of the merger of the key encapsulation mechanism LEDAkem and the public-key cryptosystem LEDApkc, which were submitted to the first round of the
M. Baldi +4 more
openaire +1 more source
Study on the parameters of the matrix NTRU cryptosystem
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen +3 more
doaj +1 more source

