Results 31 to 40 of about 6,099,057 (328)

Fault Attacks on CCA-secure Lattice KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process ...
Peter Pessl, Lukas Prokop
doaj   +1 more source

Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments

open access: yesSensors, 2021
Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security.
Taehoon Kim   +3 more
doaj   +1 more source

Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

open access: yesIEEE Access, 2023
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures ...
Tung-Tso Tsai   +2 more
doaj   +1 more source

A novel homomorphic polynomial public key encapsulation algorithm

open access: yesF1000Research, 2023
Background: One of the primary drivers in development of novel quantum-safe cryptography techniques is the ongoing National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition, which aims to identify quantum-safe ...
Randy Kuang, Maria Perepechaenko
semanticscholar   +1 more source

Does modularity undermine the pro‐emotion consensus? [PDF]

open access: yes, 2020
There is a growing consensus that emotions contribute positively to human practical rationality. While arguments that defend this position often appeal to the modularity of emotion-generation mechanisms, these arguments are also susceptible to the ...
Majeed, Raamy
core   +1 more source

Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

open access: yesIEEE Open Journal of the Computer Society, 2020
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries.
Jui-Di Wu   +3 more
doaj   +1 more source

Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism

open access: yesTongxin xuebao, 2023
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU   +4 more
doaj   +2 more sources

A Constant-time AVX2 Implementation of a Variant of ROLLO

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj   +1 more source

Riboflavin: The Health Benefits of a Forgotten Natural Vitamin [PDF]

open access: yes, 2020
Riboflavin (RF) is a water-soluble member of the B-vitamin family. Sufficient dietary and supplemental RF intake appears to have a protective effect on various medical conditions such as sepsis, ischemia etc., while it also contributes to the reduction ...
Bäumler, Hans   +4 more
core   +1 more source

CAKE: Code-Based Algorithm for Key Encapsulation [PDF]

open access: yes, 2017
Current widely-used key exchange (KE) mechanisms will be vulnerable to quantum attacks when sufficiently strong quantum computers become available. Therefore, devising quantum-resistant replacements that combine efficiency with solid security guarantees is an important and challenging task.
Shay Gueron   +8 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy