Results 11 to 20 of about 186,193 (271)
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments
Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security.
Taehoon Kim +3 more
doaj +1 more source
Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures ...
Tung-Tso Tsai +2 more
doaj +1 more source
Does modularity undermine the pro‐emotion consensus? [PDF]
There is a growing consensus that emotions contribute positively to human practical rationality. While arguments that defend this position often appeal to the modularity of emotion-generation mechanisms, these arguments are also susceptible to the ...
Majeed, Raamy
core +1 more source
Key encapsulation mechanism based on polar codes
This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms.
Reza Hooshmand, Mahdi Khoshfekr
doaj +1 more source
Bit Flipping Key Encapsulation for the Post-Quantum Era
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi +3 more
doaj +1 more source
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries.
Jui-Di Wu +3 more
doaj +1 more source
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU +4 more
doaj +2 more sources
A Constant-time AVX2 Implementation of a Variant of ROLLO
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj +1 more source
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue +3 more
doaj +1 more source
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications
Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping Key
Pavol Zajac
doaj +1 more source

