Results 21 to 30 of about 131,074 (313)

Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols

open access: goldIEEE Access
Cryptographic protocols can be used to covertly exchange information without arousing suspicion. The covert channels created in this way are called subliminal channels. In this work, three different subliminal channels using CRYSTALS-Kyber are discovered.
Roberto Roman   +2 more
doaj   +2 more sources

A provably masked implementation of BIKE Key Encapsulation Mechanism [PDF]

open access: hybridIACR Communications in Cryptology
BIKE is a post-quantum key encapsulation mechanism (KEM) selected for the 4th round of the NIST's standardization campaign. It relies on the hardness of the syndrome decoding problem for quasi-cyclic codes and on the indistinguishability of the public key from a random element, and provides the most competitive performance among round 4 candidates ...
Loïc Demange, Mélissa Rossi
openalex   +2 more sources

Module-lattice-based key-encapsulation mechanism standard

open access: gold
A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to perform basic tasks in secure communications, such as
National Institute of Standards and Technology (US)
openalex   +2 more sources

SM9 Key Encapsulation Mechanism for Power Monitoring Systems [PDF]

open access: diamondInternational Journal of Advanced Computer Science and Applications
Chao Hong   +5 more
openalex   +2 more sources

Mobile IP: state of the art report [PDF]

open access: yes, 1999
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core   +9 more sources

Riboflavin: The Health Benefits of a Forgotten Natural Vitamin [PDF]

open access: yes, 2020
Riboflavin (RF) is a water-soluble member of the B-vitamin family. Sufficient dietary and supplemental RF intake appears to have a protective effect on various medical conditions such as sepsis, ischemia etc., while it also contributes to the reduction ...
Bäumler, Hans   +4 more
core   +1 more source

Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism

open access: yesTongxin xuebao, 2023
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU   +4 more
doaj   +2 more sources

Public Key Protocols over Skew Dihedral Group Rings

open access: yesMathematics, 2022
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz   +2 more
doaj   +1 more source

SIKE on GPU: Accelerating Supersingular Isogeny-Based Key Encapsulation Mechanism on Graphic Processing Units

open access: yesIEEE Access, 2021
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant attention as a promising candidate for post-quantum cryptography (PQC ...
Seog Chung Seo
doaj   +1 more source

Home - About - Disclaimer - Privacy