Results 91 to 100 of about 6,104 (190)
Methodology and Architecture for Benchmarking End-to-End PQC Protocol Resilience in an IoT Context
Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat.
Mohammed G. Almutairi +1 more
doaj +1 more source
Od kultury zpětné vazby ke kybernetice [PDF]
Cílem článku je v historickém kontextu analyzovat základy, na nichž stojí dnešní vědní obor kybernetika, a nabídnout takovou definici kybernetiky, která by odpovídala jak jejím původním kořenům, tak i aktuální institucionalizované vědeckovýzkumné a ...
Romportl, Jan
core
High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number
Trong-Hung Nguyen +3 more
doaj +1 more source
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan +2 more
doaj +1 more source
Independence clustering (without a matrix)
The independence clustering problem is considered in the following formulation: given a set $S$ of random variables, it is required to find the finest partitioning $\{U_1,\dots,U_k\}$ of $S$ into clusters such that the clusters $U_1,\dots,U_k$ are ...
Ryabko, Daniil
core
Spartan Daily, October 2, 1975 [PDF]
Volume 65, Issue 15https://scholarworks.sjsu.edu/spartandaily/6000/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +1 more source
Cryptographic protocols can be used to covertly exchange information without arousing suspicion. The covert channels created in this way are called subliminal channels. In this work, three different subliminal channels using CRYSTALS-Kyber are discovered.
Roberto Roman +2 more
doaj +1 more source
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised.
Maksim Iavich, Tamari Kuchukhidze
doaj +1 more source
The article performs a critical evaluation of writings by Mark A. Gabriel especially his perspectives on interfaith connections and Islamic beliefs.
Muhammad Naeem Awan
doaj
Post-Quantum Cryptography (PQC) indicates a significant progression in cryptographic research. Kyber-512, a principal algorithm in the Kyber family, has attained international standard certification in PQC.
Kritsanapong Somsuk
doaj +1 more source

