Results 91 to 100 of about 6,104 (190)

Methodology and Architecture for Benchmarking End-to-End PQC Protocol Resilience in an IoT Context

open access: yesIoT
Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat.
Mohammed G. Almutairi   +1 more
doaj   +1 more source

Od kultury zpětné vazby ke kybernetice [PDF]

open access: yes, 2014
Cílem článku je v historickém kontextu analyzovat základy, na nichž stojí dnešní vědní obor kybernetika, a nabídnout takovou definici kybernetiky, která by odpovídala jak jejím původním kořenům, tak i aktuální institucionalizované vědeckovýzkumné a ...
Romportl, Jan
core  

High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium

open access: yesIEEE Access
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number
Trong-Hung Nguyen   +3 more
doaj   +1 more source

Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)

open access: yesInformation
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan   +2 more
doaj   +1 more source

Independence clustering (without a matrix)

open access: yes, 2017
The independence clustering problem is considered in the following formulation: given a set $S$ of random variables, it is required to find the finest partitioning $\{U_1,\dots,U_k\}$ of $S$ into clusters such that the clusters $U_1,\dots,U_k$ are ...
Ryabko, Daniil
core  

Spartan Daily, October 2, 1975 [PDF]

open access: yes, 1975
Volume 65, Issue 15https://scholarworks.sjsu.edu/spartandaily/6000/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +1 more source

Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols

open access: yesIEEE Access
Cryptographic protocols can be used to covertly exchange information without arousing suspicion. The covert channels created in this way are called subliminal channels. In this work, three different subliminal channels using CRYSTALS-Kyber are discovered.
Roberto Roman   +2 more
doaj   +1 more source

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

open access: yesCryptography
Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised.
Maksim Iavich, Tamari Kuchukhidze
doaj   +1 more source

ENGLISH-MARK GABRIEL’S CRITIQUE OF ISLAM: A CRITICAL EVALUATION OF THE HISTORICAL CLAIMS, RELIGIOUS COMPARISONS, AND THEIR SOCIO-POLITICAL IMPLICATIONS

open access: yesدی اسکالر
The article performs a critical evaluation of writings by Mark A. Gabriel especially his perspectives on interfaith connections and Islamic beliefs.
Muhammad Naeem Awan
doaj  

Message Group Optimization in Kyber-512 Post-Quantum Cryptography: Comparing Proposed Static Encoding With Huffman Code, Base-64, and ASCII Methods

open access: yesIEEE Access
Post-Quantum Cryptography (PQC) indicates a significant progression in cryptographic research. Kyber-512, a principal algorithm in the Kyber family, has attained international standard certification in PQC.
Kritsanapong Somsuk
doaj   +1 more source

Home - About - Disclaimer - Privacy