Results 31 to 40 of about 186,193 (271)

Standard Lattice-Based Key Encapsulation on Embedded Devices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe   +3 more
doaj   +1 more source

Public Key Protocols over Skew Dihedral Group Rings

open access: yesMathematics, 2022
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz   +2 more
doaj   +1 more source

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Mechanisms of burst release from pH-responsive polymeric microparticles. [PDF]

open access: yes, 2011
Microencapsulation of drugs into preformed polymers is commonly achieved through solvent evaporation techniques or spray drying. We compared these encapsulation methods in terms of controlled drug release properties of the prepared microparticles and ...
Donaldson, M   +4 more
core   +1 more source

RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices

open access: yesIEEE Access, 2019
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee   +4 more
doaj   +1 more source

Chronic constipation and acute small bowel obstruction due to small bowel encapsulation: A case report

open access: yesClinical Case Reports, 2023
Key Clinical Message Peritoneal encapsulation is most of the time asymptomatic and is found incidentally, but when symptomatic it usually presents with bowel obstruction. CT scan is a gold standard for the diagnosis of bowel encapsulation.
Seyed Hossein Hajimirzaei   +6 more
doaj   +1 more source

Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera   +3 more
doaj   +1 more source

Biological Control of Alfalfa Blotch Leafminer (Diptera: Agromyzidae) in Ontario: Status and Ecology of Parasitoids (Hymenoptera: Braconidae, Eulophidae) 20 Years After Introduction [PDF]

open access: yes, 2018
Two European parasitoid species were released in Ontario during the late 1970\u27s to control the alfalfa blotch leafminer, Agromyza frontella (Rondani) (Diptera: Agromyzidae). One of these, Dacnusa dryas (Nixon) (Hymenoptera: Braconidae), rapidly became
Heimpel, George E, Meloche, Francois
core   +2 more sources

Mobile IP: state of the art report [PDF]

open access: yes, 1999
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core   +4 more sources

Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
BIKE is a Key Encapsulation Mechanism selected as an alternate candidate in NIST’s PQC standardization process, in which performance plays a significant role in the third round.
Jan Richter-Brockmann   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy