Results 31 to 40 of about 6,039 (185)

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann   +6 more
doaj   +1 more source

Higher-Order Energy Expansions and Spike Locations [PDF]

open access: yes, 2004
We consider the following singularly perturbed semilinear elliptic problem: (I)\left\{ \begin{array}{l} \epsilon^{2} \Delta u - u + f(u)=0 \ \ \mbox{in} \ \Omega, \\ u>0 \ \ \mbox{in} \ \ \Omega \ \ \mbox{and} \ \frac{\partial u}{\partial \nu}
Wei, J, Winter, M
core   +1 more source

Graphical Markov models: overview [PDF]

open access: yes, 2015
We describe how graphical Markov models started to emerge in the last 40 years, based on three essential concepts that had been developed independently more than a century ago.
Andersen   +73 more
core   +2 more sources

Password authenticated key exchange-based on Kyber for mobile devices. [PDF]

open access: yesPeerJ Comput Sci
In this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused on how the PAKE version of PQC standard Kyber with mobile compatibility can be obtained by using simple ...
Seyhan K, Akleylek S, Dursun AF.
europepmc   +6 more sources

Cyberfeminists guerrillas: the battle from the codes [PDF]

open access: yes, 2018
Este texto propone pensar las dos décadas de ciberfeminismos como prácticas de “guerrillas semiológicas”. Para ello se analizarán las estrategias sígnicas que convierten a las ciberfeministas en guerrilleras dispuestas a dar la batalla desde el lugar ...
Salvador Agra, Saleta de
core   +1 more source

Podrumko

open access: yes[sic], 2016
Između ponoći i jednog sata oživi sve ono za što glupi ljudi vjeruju da oživjeti ne može. Ali zaista, mnogobrojne stvari koje inače samo ukočeno i mirno leže, kao da ne mogu reći ni „dobar dan“, sve one u to vrijeme ožive. I ne brinu mnogo o tome vjeruju
Manfred Kyber, Sanja Matković
doaj   +1 more source

Is there an integrative center in the vertebrate brain-stem? A robotic evaluation of a model of the reticular formation viewed as an action selection device [PDF]

open access: yes, 2005
Neurobehavioral data from intact, decerebrate, and neonatal rats, suggests that the reticular formation provides a brainstem substrate for action selection in the vertebrate central nervous system.
Baerends, G.   +15 more
core   +2 more sources

Pre-integration lateral inhibition enhances unsupervised learning [PDF]

open access: yes, 2002
A large and influential class of neural network architectures use post-integration lateral inhibition as a mechanism for competition. We argue that these algorithms are computationally deficient in that they fail to generate, or learn, appropriate ...
Johnson, M. H., Spratling, M. W.
core   +3 more sources

Hardware Acceleration of Crystals-Kyber in Low-Complexity Embedded Systems With RISC-V Instruction Set Extensions

open access: yesIEEE Access
The imminent rise of practical quantum computing threatens well-established cryptography algorithms for secret key exchange in use today, such as Diffie-Hellman, RSA and Elliptic Curve based schemes.
Carlos Gewehr   +2 more
doaj   +1 more source

Robust watermarking for diffusion models using error-correcting codes and post-quantum key encapsulation

open access: yesFrontiers in Physics
Critical infrastructures increasingly rely on AI-generated content (AIGC) for monitoring, decision support, and autonomous control. This dependence creates new attack surfaces: forged maintenance imagery, manipulated diagnostic scans, or spoofed sensor ...
Xianglei Hu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy