Results 31 to 40 of about 186,193 (271)
Standard Lattice-Based Key Encapsulation on Embedded Devices
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe +3 more
doaj +1 more source
Public Key Protocols over Skew Dihedral Group Rings
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz +2 more
doaj +1 more source
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source
Mechanisms of burst release from pH-responsive polymeric microparticles. [PDF]
Microencapsulation of drugs into preformed polymers is commonly achieved through solvent evaporation techniques or spray drying. We compared these encapsulation methods in terms of controlled drug release properties of the prepared microparticles and ...
Donaldson, M +4 more
core +1 more source
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee +4 more
doaj +1 more source
Key Clinical Message Peritoneal encapsulation is most of the time asymptomatic and is found incidentally, but when symptomatic it usually presents with bowel obstruction. CT scan is a gold standard for the diagnosis of bowel encapsulation.
Seyed Hossein Hajimirzaei +6 more
doaj +1 more source
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera +3 more
doaj +1 more source
Biological Control of Alfalfa Blotch Leafminer (Diptera: Agromyzidae) in Ontario: Status and Ecology of Parasitoids (Hymenoptera: Braconidae, Eulophidae) 20 Years After Introduction [PDF]
Two European parasitoid species were released in Ontario during the late 1970\u27s to control the alfalfa blotch leafminer, Agromyza frontella (Rondani) (Diptera: Agromyzidae). One of these, Dacnusa dryas (Nixon) (Hymenoptera: Braconidae), rapidly became
Heimpel, George E, Meloche, Francois
core +2 more sources
Mobile IP: state of the art report [PDF]
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core +4 more sources
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
BIKE is a Key Encapsulation Mechanism selected as an alternate candidate in NIST’s PQC standardization process, in which performance plays a significant role in the third round.
Jan Richter-Brockmann +3 more
doaj +1 more source

