Results 121 to 130 of about 133,492 (314)
Security analysis of promising key encapsulation mechanisms in the core-SVP model
Sergey Kandiy
openalex +2 more sources
Edible electronics needs integrated logic circuits for computation and control. This work presents a potentially edible printed chitosan‐gated transistor with a design optimized for integration in circuits. Its implementation in integrated logic gates and circuits operating at low voltage (0.7 V) is demonstrated, as well as the compatibility with an ...
Giulia Coco +8 more
wiley +1 more source
SoK: Evolution of the Key Encapsulation Mechanism’s Role in Cryptographic Migrations for IoT Systems
Key Encapsulation Mechanisms (KEM) is a special case of Public Key Encryption (PKE) that was recently standardized by National Institute of Standards and Technology in USA.
Silonosov Alexandr +2 more
doaj +1 more source
Design and analysis of group key exchange protocols [PDF]
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core +1 more source
For the first time, a highly sensitive electrochemical biosensor based on SiO2‐based hairy particles with a grafted PDMAEMA polymer brush containing a quantifiable and large amount of immobilized Laccase is reported. The fabricated biosensor exhibits a sensitivity of 0.14 A·m⁻¹, a limit of detection (LOD) of 0.1 µm, and a detection range of 0.3–750 µm,
Pavel Milkin +7 more
wiley +1 more source
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms [PDF]
Suparna Kundu +5 more
openalex +3 more sources
The existing mainstream post-quantum key encapsulation mechanisms, such as the module-lattice-based key encapsulation mechanism (ML-KEM), rely on the module learning with errors (Module-LWE) problem associated with structured lattices.
PAN Jie +7 more
doaj
Kyber, Saber, and SK‐MLWR Lattice‐Based Key Encapsulation Mechanisms Model Checking with Maude [PDF]
Duong Dinh Tran +4 more
openalex +1 more source
Study of fault-tolerant software technology [PDF]
Presented is an overview of the current state of the art of fault-tolerant software and an analysis of quantitative techniques and models developed to assess its impact.
Broglio, C. +6 more
core +1 more source

