Results 31 to 40 of about 6,039 (185)
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann +6 more
doaj +1 more source
Higher-Order Energy Expansions and Spike Locations [PDF]
We consider the following singularly perturbed semilinear elliptic problem: (I)\left\{ \begin{array}{l} \epsilon^{2} \Delta u - u + f(u)=0 \ \ \mbox{in} \ \Omega, \\ u>0 \ \ \mbox{in} \ \ \Omega \ \ \mbox{and} \ \frac{\partial u}{\partial \nu}
Wei, J, Winter, M
core +1 more source
Graphical Markov models: overview [PDF]
We describe how graphical Markov models started to emerge in the last 40 years, based on three essential concepts that had been developed independently more than a century ago.
Andersen +73 more
core +2 more sources
Password authenticated key exchange-based on Kyber for mobile devices. [PDF]
In this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused on how the PAKE version of PQC standard Kyber with mobile compatibility can be obtained by using simple ...
Seyhan K, Akleylek S, Dursun AF.
europepmc +6 more sources
Cyberfeminists guerrillas: the battle from the codes [PDF]
Este texto propone pensar las dos décadas de ciberfeminismos como prácticas de “guerrillas semiológicas”. Para ello se analizarán las estrategias sígnicas que convierten a las ciberfeministas en guerrilleras dispuestas a dar la batalla desde el lugar ...
Salvador Agra, Saleta de
core +1 more source
Između ponoći i jednog sata oživi sve ono za što glupi ljudi vjeruju da oživjeti ne može. Ali zaista, mnogobrojne stvari koje inače samo ukočeno i mirno leže, kao da ne mogu reći ni „dobar dan“, sve one u to vrijeme ožive. I ne brinu mnogo o tome vjeruju
Manfred Kyber, Sanja Matković
doaj +1 more source
Is there an integrative center in the vertebrate brain-stem? A robotic evaluation of a model of the reticular formation viewed as an action selection device [PDF]
Neurobehavioral data from intact, decerebrate, and neonatal rats, suggests that the reticular formation provides a brainstem substrate for action selection in the vertebrate central nervous system.
Baerends, G. +15 more
core +2 more sources
Pre-integration lateral inhibition enhances unsupervised learning [PDF]
A large and influential class of neural network architectures use post-integration lateral inhibition as a mechanism for competition. We argue that these algorithms are computationally deficient in that they fail to generate, or learn, appropriate ...
Johnson, M. H., Spratling, M. W.
core +3 more sources
The imminent rise of practical quantum computing threatens well-established cryptography algorithms for secret key exchange in use today, such as Diffie-Hellman, RSA and Elliptic Curve based schemes.
Carlos Gewehr +2 more
doaj +1 more source
Critical infrastructures increasingly rely on AI-generated content (AIGC) for monitoring, decision support, and autonomous control. This dependence creates new attack surfaces: forged maintenance imagery, manipulated diagnostic scans, or spoofed sensor ...
Xianglei Hu +5 more
doaj +1 more source

