Results 31 to 40 of about 16,532 (241)

LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate [PDF]

open access: yes, 2019
We consider the QC-LDPC code-based cryptosystems named LEDAcrypt, which are under consideration by NIST for the second round of the post-quantum cryptography standardization initiative. LEDAcrypt is the result of the merger of the key encapsulation mechanism LEDAkem and the public-key cryptosystem LEDApkc, which were submitted to the first round of the
M. Baldi   +4 more
openaire   +1 more source

Study on the parameters of the matrix NTRU cryptosystem

open access: yes河南理工大学学报. 自然科学版
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen   +3 more
doaj   +1 more source

Dynamic adversarial neural cryptography for ensuring privacy in smart contracts [PDF]

open access: yesPeerJ Computer Science
Various types of research are being carried out to advance in the field of cryptography and develop a more robust technique for security. Adversarial neural cryptography (ANC) is a recent development in this extension, which possesses huge potential to ...
Basil Hanafi   +4 more
doaj   +2 more sources

Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

open access: yes, 2019
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker   +16 more
core   +1 more source

The Impact of Decryption Failures on the Security of NTRU Encryption [PDF]

open access: yes, 2003
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security properties of a cryptosystem, as it limits the ability to build a simulator in the random oracle model without knowledge of the private key.
Nick Howgrave-Graham   +6 more
openaire   +1 more source

VSSTPM: Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications

open access: yesDigital Communications and Networks
The Internet of Things (IoT) has become an integral part of daily life, making the protection of user privacy increasingly important. In gateway-based IoT systems, user data is transmitted through gateways to platforms, pushing the data to various ...
Ye Bai   +4 more
doaj   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

3D Textured Model Encryption via 3D Lu Chaotic Mapping

open access: yes, 2017
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov   +9 more
core   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Class IIa HDACs forced degradation allows resensitization of oxaliplatin‐resistant FBXW7‐mutated colorectal cancer

open access: yesMolecular Oncology, EarlyView.
HDAC4 is degraded by the E3 ligase FBXW7. In colorectal cancer, FBXW7 mutations prevent HDAC4 degradation, leading to oxaliplatin resistance. Forced degradation of HDAC4 using a PROTAC compound restores drug sensitivity by resetting the super‐enhancer landscape, reprogramming the epigenetic state of FBXW7‐mutated cells to resemble oxaliplatin ...
Vanessa Tolotto   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy