Results 31 to 40 of about 6,099,057 (328)
Fault Attacks on CCA-secure Lattice KEMs
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process ...
Peter Pessl, Lukas Prokop
doaj +1 more source
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments
Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security.
Taehoon Kim +3 more
doaj +1 more source
Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures ...
Tung-Tso Tsai +2 more
doaj +1 more source
A novel homomorphic polynomial public key encapsulation algorithm
Background: One of the primary drivers in development of novel quantum-safe cryptography techniques is the ongoing National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition, which aims to identify quantum-safe ...
Randy Kuang, Maria Perepechaenko
semanticscholar +1 more source
Does modularity undermine the pro‐emotion consensus? [PDF]
There is a growing consensus that emotions contribute positively to human practical rationality. While arguments that defend this position often appeal to the modularity of emotion-generation mechanisms, these arguments are also susceptible to the ...
Majeed, Raamy
core +1 more source
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries.
Jui-Di Wu +3 more
doaj +1 more source
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU +4 more
doaj +2 more sources
A Constant-time AVX2 Implementation of a Variant of ROLLO
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj +1 more source
Riboflavin: The Health Benefits of a Forgotten Natural Vitamin [PDF]
Riboflavin (RF) is a water-soluble member of the B-vitamin family. Sufficient dietary and supplemental RF intake appears to have a protective effect on various medical conditions such as sepsis, ischemia etc., while it also contributes to the reduction ...
Bäumler, Hans +4 more
core +1 more source
CAKE: Code-Based Algorithm for Key Encapsulation [PDF]
Current widely-used key exchange (KE) mechanisms will be vulnerable to quantum attacks when sufficiently strong quantum computers become available. Therefore, devising quantum-resistant replacements that combine efficiency with solid security guarantees is an important and challenging task.
Shay Gueron +8 more
openaire +2 more sources

