Results 71 to 80 of about 3,545,158 (344)

Differential Fault Attacks on Deterministic Lattice Signatures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks.
Leon Groot Bruinderink, Peter Pessl
doaj   +1 more source

Regression modeling for digital test of ΣΔ modulators [PDF]

open access: yes, 2010
The cost of Analogue and Mixed-Signal circuit testing is an important bottleneck in the industry, due to timeconsuming verification of specifications that require state-ofthe- art Automatic Test Equipment.
Léger, Gildas, Rueda Rueda, Adoración
core  

Multi-dimensional key generation of ICMetrics for cloud computing [PDF]

open access: yes, 2015
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa   +3 more
core   +2 more sources

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature

open access: yesIET Information Security, 2021
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue   +3 more
doaj   +1 more source

Secure agent data integrity shield [PDF]

open access: yes, 2004
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius   +15 more
core   +1 more source

Experimental demonstration of kilometer-range quantum digital signatures [PDF]

open access: yes, 2015
We present an experimental realization of a quantum digital signature protocol which, together with a standard quantum key distribution link, increases transmission distance to kilometer ranges, three orders of magnitude larger than in previous ...
R. Donaldson   +8 more
semanticscholar   +1 more source

FGFR Like1 drives esophageal cancer progression via EMT, PI3K/Akt, and notch signalling: insights from clinical data and next‐generation sequencing analysis

open access: yesFEBS Open Bio, EarlyView.
Clinical analysis reveals significant dysregulation of FGFRL1 in esophageal cancer (EC) patients. RNAi‐coupled next‐generation sequencing (NGS) and in vitro study reveal FGFRL1‐mediated EC progression via EMT, PI3K/Akt, and Notch pathways. Functional assays confirm its role in tumor growth, migration, and invasion.
Aprajita Srivastava   +3 more
wiley   +1 more source

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures

open access: yesIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +1 more source

Survey of code-based digital signatures

open access: yes网络与信息安全学报, 2021
The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.
SONG Yongcheng   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy