Results 51 to 60 of about 6,099,057 (328)
Key Clinical Message Peritoneal encapsulation is most of the time asymptomatic and is found incidentally, but when symptomatic it usually presents with bowel obstruction. CT scan is a gold standard for the diagnosis of bowel encapsulation.
Seyed Hossein Hajimirzaei +6 more
doaj +1 more source
Public Key Protocols over Skew Dihedral Group Rings
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz +2 more
doaj +1 more source
Plaintext awareness in identity-based key encapsulation [PDF]
The notion of plaintext awareness ( $${\mathsf{PA}}$$ PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( $${\mathsf{IND}\hbox {-}{\mathsf{CCA ...
Manulis, Mark +2 more
openaire +3 more sources
What Can Information Encapsulation Tell Us About Emotional Rationality? [PDF]
What can features of cognitive architecture, e.g. the information encapsulation of certain emotion processing systems, tell us about emotional rationality?
D Evans +14 more
core +1 more source
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms [PDF]
Attribute-Based Encryption (ABE) allows to target the recipients of a message according to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can choose the policy at the encryption time.In this paper, we define a new property for ABE: homomorphic-policy.
Chotard, Jérémy +2 more
openaire +5 more sources
Mechanisms of burst release from pH-responsive polymeric microparticles. [PDF]
Microencapsulation of drugs into preformed polymers is commonly achieved through solvent evaporation techniques or spray drying. We compared these encapsulation methods in terms of controlled drug release properties of the prepared microparticles and ...
Donaldson, M +4 more
core +1 more source
High-Speed Key Encapsulation from NTRU
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive with more recent lattice-based cryptosystems in terms of speed, key size, and ciphertext size. We present a slightly simplified version of textbook NTRU, select parameters for this encryption scheme that target the 128-bit post-quantum security level ...
Hülsing, Andreas +3 more
openaire +3 more sources
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
BIKE is a Key Encapsulation Mechanism selected as an alternate candidate in NIST’s PQC standardization process, in which performance plays a significant role in the third round.
Jan Richter-Brockmann +3 more
doaj +1 more source
Origin and Suppression of $1/f$ Magnetic Flux Noise [PDF]
Magnetic flux noise is a dominant source of dephasing and energy relaxation in superconducting qubits. The noise power spectral density varies with frequency as $1/f^\alpha$ with $\alpha \sim 1$ and spans 13 orders of magnitude.
Beck, M. A. +9 more
core +2 more sources
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
We present the first practical software implementation of Supersingular Isogeny Key Encapsulation (SIKE) round 2, targeting NIST's 1, 2, 3, and 5 security levels on 32-bit ARM Cortex-M4 microcontrollers. The proposed library introduces a new speed record
Hwajeong Seo +3 more
semanticscholar +1 more source

