Results 31 to 40 of about 16,583 (248)

Discretisation and Product Distributions in Ring-LWE

open access: yesJournal of Mathematical Cryptology, 2020
A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for degree-1 and degree-2 ciphertexts in the homomorphic ...
Murphy Sean, Player Rachel
doaj   +1 more source

Decentralized Inner-Product Encryption with Constant-Size Ciphertext

open access: yesApplied Sciences, 2022
With the rise of technology in recent years, more people are studying distributed system architecture, such as the e-government system. The advantage of this architecture is that when a single point of failure occurs, it does not cause the system to be ...
Yi-Fan Tseng, Shih-Jie Gao
doaj   +1 more source

Dynamic adversarial neural cryptography for ensuring privacy in smart contracts [PDF]

open access: yesPeerJ Computer Science
Various types of research are being carried out to advance in the field of cryptography and develop a more robust technique for security. Adversarial neural cryptography (ANC) is a recent development in this extension, which possesses huge potential to ...
Basil Hanafi   +4 more
doaj   +2 more sources

Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

open access: yes, 2019
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker   +16 more
core   +1 more source

SPA on Rabin variant with public key N= p2q [PDF]

open access: yes, 2016
Variants of the Rabin cryptosystem are built to overcome the decryption failure problem encountered by the cryptosystem. In this paper, we perform a theoretical simple power analysis on one of the variants that operates its decryption procedure via ...
Abd Ghafar, Amir Hamzah   +1 more
core   +1 more source

The Impact of Decryption Failures on the Security of NTRU Encryption [PDF]

open access: yes, 2003
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security properties of a cryptosystem, as it limits the ability to build a simulator in the random oracle model without knowledge of the private key.
Nick Howgrave-Graham   +6 more
openaire   +1 more source

VSSTPM: Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications

open access: yesDigital Communications and Networks
The Internet of Things (IoT) has become an integral part of daily life, making the protection of user privacy increasingly important. In gateway-based IoT systems, user data is transmitted through gateways to platforms, pushing the data to various ...
Ye Bai   +4 more
doaj   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

The Random Oracle Methodology, Revisited [PDF]

open access: yes, 2000
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called "cryptographic hash functions".
Canetti, Ran   +2 more
core   +6 more sources

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy