Results 91 to 100 of about 138,401 (282)
Recovering Secrets From Prefix-Dependent Leakage
We discuss how to recover a secret bitstring given partial information obtained during a computation over that string, assuming the computation is a deterministic algorithm processing the secret bits sequentially.
Ferradi Houda +4 more
doaj +1 more source
Cryptanalysis of some protocols using matrices over group rings
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.
Eftekhari, Mohammad
core
Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio +3 more
wiley +1 more source
On the asymptotic effectiveness of Weil descent attacks
In this paper we investigate the asymptotic effectiveness of the Gaudry–Hess–Smart Weil descent attack and its generalization to the discrete logarithm problem for elliptic curves over characteristic-two finite fields.
Karabina Koray +3 more
doaj +1 more source
A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges +2 more
doaj +1 more source
Solid Harmonic Wavelet Bispectrum for Image Analysis
The Solid Harmonic Wavelet Bispectrum (SHWB), a rotation‐ and translation‐invariant descriptor that captures higher‐order (phase) correlations in signals, is introduced. Combining wavelet scattering, bispectral analysis, and group theory, SHWB achieves interpretable, data‐efficient representations and demonstrates competitive performance across texture,
Alex Brown +3 more
wiley +1 more source
Quantum algorithm for solving binary hyperelliptic curve discrete logarithm problem
It is well-established that Shor’s algorithm can solve the discrete logarithm problem (DLP) in polynomial time. The hyperelliptic curve DLP (HCDLP) of genus 2 has found widespread industrial applications and remains an active research domain.
Yan Huang +4 more
doaj +1 more source
Photon‐Sphere Modes in Curved Optical Microcavities: A Black‐Hole Analogue Laser
An optical analogue of a Schwarzschild black hole is realized using curved microcavities that preserve light‐like geodesics. A new family of laser modes confined around the photon sphere is identified alongside conventional whispering‐gallery modes. Analytical theory, numerical simulations, and experiments reveal curvature‐induced confinement, enabling
Chenni Xu +9 more
wiley +1 more source
A neural network‐enabled permittivity engineering paradigm is introduced, transcending traditional trial‐and‐error design. By decoupling electromagnetic parameters and screening a high‐throughput feature space, an ultrathin (1.0 mm) magnetic absorber is inversely designed, experimentally achieving a superior and customizable 5.1 GHz bandwidth and ...
Chenxi Liu +9 more
wiley +1 more source
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings
ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which are based on number theoretic problems such as discrete
Pandey Atul +2 more
doaj +1 more source

