Results 21 to 30 of about 131,074 (313)
Cryptographic protocols can be used to covertly exchange information without arousing suspicion. The covert channels created in this way are called subliminal channels. In this work, three different subliminal channels using CRYSTALS-Kyber are discovered.
Roberto Roman +2 more
doaj +2 more sources
A provably masked implementation of BIKE Key Encapsulation Mechanism [PDF]
BIKE is a post-quantum key encapsulation mechanism (KEM) selected for the 4th round of the NIST's standardization campaign. It relies on the hardness of the syndrome decoding problem for quasi-cyclic codes and on the indistinguishability of the public key from a random element, and provides the most competitive performance among round 4 candidates ...
Loïc Demange, Mélissa Rossi
openalex +2 more sources
Module-lattice-based key-encapsulation mechanism standard
A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to perform basic tasks in secure communications, such as
National Institute of Standards and Technology (US)
openalex +2 more sources
SM9 Key Encapsulation Mechanism for Power Monitoring Systems [PDF]
Chao Hong +5 more
openalex +2 more sources
Mobile IP: state of the art report [PDF]
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core +9 more sources
Riboflavin: The Health Benefits of a Forgotten Natural Vitamin [PDF]
Riboflavin (RF) is a water-soluble member of the B-vitamin family. Sufficient dietary and supplemental RF intake appears to have a protective effect on various medical conditions such as sepsis, ischemia etc., while it also contributes to the reduction ...
Bäumler, Hans +4 more
core +1 more source
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU +4 more
doaj +2 more sources
Public Key Protocols over Skew Dihedral Group Rings
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz +2 more
doaj +1 more source
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant attention as a promising candidate for post-quantum cryptography (PQC ...
Seog Chung Seo
doaj +1 more source

