INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope
The Newhope scheme is one of the milestones of the study in key agreement protocol but it lacks the anti-active-attack capability. In this article, we propose a mutual authenticated key agreement scheme named INAKA scheme based on the commitment value ...
Yatao Yang +5 more
doaj +1 more source
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes on a conventional ...
Crystal Andrea Roma +2 more
doaj +1 more source
Lack of phenotypic and evolutionary cross-resistance against parasitoids and pathogens in Drosophila melanogaster [PDF]
BackgroundWhen organisms are attacked by multiple natural enemies, the evolution of a resistance mechanism to one natural enemy will be influenced by the degree of cross-resistance to another natural enemy.
A Fytrou +52 more
core +2 more sources
Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National ...
Ricardo Villanueva-Polanco +1 more
doaj +1 more source
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call in the category of public key encryption schemes.
Miguel Ángel González de la Torre +2 more
doaj +1 more source
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj +1 more source
Antimicrobial and anti-inflammatory activity of chitosan-alginate nanoparticles: a targeted therapy for cutaneous pathogens. [PDF]
Advances in nanotechnology have demonstrated potential application of nanoparticles (NPs) for effective and targeted drug delivery. Here we investigated the antimicrobial and immunological properties and the feasibility of using NPs to deliver ...
Blecher-Paz, Karin +10 more
core +1 more source
Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography.
Yongseok Lee +4 more
doaj +1 more source
What Can Information Encapsulation Tell Us About Emotional Rationality? [PDF]
What can features of cognitive architecture, e.g. the information encapsulation of certain emotion processing systems, tell us about emotional rationality?
D Evans +14 more
core +1 more source
QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems [PDF]
This article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) satellite systems.
C Caini +21 more
core +1 more source

