Results 31 to 40 of about 16,532 (241)
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate [PDF]
We consider the QC-LDPC code-based cryptosystems named LEDAcrypt, which are under consideration by NIST for the second round of the post-quantum cryptography standardization initiative. LEDAcrypt is the result of the merger of the key encapsulation mechanism LEDAkem and the public-key cryptosystem LEDApkc, which were submitted to the first round of the
M. Baldi +4 more
openaire +1 more source
Study on the parameters of the matrix NTRU cryptosystem
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen +3 more
doaj +1 more source
Dynamic adversarial neural cryptography for ensuring privacy in smart contracts [PDF]
Various types of research are being carried out to advance in the field of cryptography and develop a more robust technique for security. Adversarial neural cryptography (ANC) is a recent development in this extension, which possesses huge potential to ...
Basil Hanafi +4 more
doaj +2 more sources
Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker +16 more
core +1 more source
The Impact of Decryption Failures on the Security of NTRU Encryption [PDF]
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security properties of a cryptosystem, as it limits the ability to build a simulator in the random oracle model without knowledge of the private key.
Nick Howgrave-Graham +6 more
openaire +1 more source
The Internet of Things (IoT) has become an integral part of daily life, making the protection of user privacy increasingly important. In gateway-based IoT systems, user data is transmitted through gateways to platforms, pushing the data to various ...
Ye Bai +4 more
doaj +1 more source
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho +3 more
wiley +1 more source
3D Textured Model Encryption via 3D Lu Chaotic Mapping
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov +9 more
core +1 more source
Tree Parity Machine Rekeying Architectures [PDF]
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core +5 more sources
HDAC4 is degraded by the E3 ligase FBXW7. In colorectal cancer, FBXW7 mutations prevent HDAC4 degradation, leading to oxaliplatin resistance. Forced degradation of HDAC4 using a PROTAC compound restores drug sensitivity by resetting the super‐enhancer landscape, reprogramming the epigenetic state of FBXW7‐mutated cells to resemble oxaliplatin ...
Vanessa Tolotto +13 more
wiley +1 more source

