Results 71 to 80 of about 3,545,158 (344)
Differential Fault Attacks on Deterministic Lattice Signatures
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks.
Leon Groot Bruinderink, Peter Pessl
doaj +1 more source
Regression modeling for digital test of ΣΔ modulators [PDF]
The cost of Analogue and Mixed-Signal circuit testing is an important bottleneck in the industry, due to timeconsuming verification of specifications that require state-ofthe- art Automatic Test Equipment.
Léger, Gildas, Rueda Rueda, Adoración
core
Multi-dimensional key generation of ICMetrics for cloud computing [PDF]
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa +3 more
core +2 more sources
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue +3 more
doaj +1 more source
Secure agent data integrity shield [PDF]
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius +15 more
core +1 more source
Experimental demonstration of kilometer-range quantum digital signatures [PDF]
We present an experimental realization of a quantum digital signature protocol which, together with a standard quantum key distribution link, increases transmission distance to kilometer ranges, three orders of magnitude larger than in previous ...
R. Donaldson +8 more
semanticscholar +1 more source
Clinical analysis reveals significant dysregulation of FGFRL1 in esophageal cancer (EC) patients. RNAi‐coupled next‐generation sequencing (NGS) and in vitro study reveal FGFRL1‐mediated EC progression via EMT, PI3K/Akt, and Notch pathways. Functional assays confirm its role in tumor growth, migration, and invasion.
Aprajita Srivastava +3 more
wiley +1 more source
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi +2 more
doaj +1 more source
Survey of code-based digital signatures
The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.
SONG Yongcheng +2 more
doaj +1 more source

