Results 31 to 40 of about 131,074 (313)
A Constant-time AVX2 Implementation of a Variant of ROLLO
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj +1 more source
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes on a conventional ...
Crystal Andrea Roma +2 more
doaj +1 more source
INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope
The Newhope scheme is one of the milestones of the study in key agreement protocol but it lacks the anti-active-attack capability. In this article, we propose a mutual authenticated key agreement scheme named INAKA scheme based on the commitment value ...
Yatao Yang +5 more
doaj +1 more source
Lack of phenotypic and evolutionary cross-resistance against parasitoids and pathogens in Drosophila melanogaster [PDF]
BackgroundWhen organisms are attacked by multiple natural enemies, the evolution of a resistance mechanism to one natural enemy will be influenced by the degree of cross-resistance to another natural enemy.
A Fytrou +52 more
core +2 more sources
Does modularity undermine the pro‐emotion consensus? [PDF]
There is a growing consensus that emotions contribute positively to human practical rationality. While arguments that defend this position often appeal to the modularity of emotion-generation mechanisms, these arguments are also susceptible to the ...
Majeed, Raamy
core +1 more source
Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National ...
Ricardo Villanueva-Polanco +1 more
doaj +1 more source
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call in the category of public key encryption schemes.
Miguel Ángel González de la Torre +2 more
doaj +1 more source
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj +1 more source
Antimicrobial and anti-inflammatory activity of chitosan-alginate nanoparticles: a targeted therapy for cutaneous pathogens. [PDF]
Advances in nanotechnology have demonstrated potential application of nanoparticles (NPs) for effective and targeted drug delivery. Here we investigated the antimicrobial and immunological properties and the feasibility of using NPs to deliver ...
Blecher-Paz, Karin +10 more
core +1 more source
Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography.
Yongseok Lee +4 more
doaj +1 more source

