Results 31 to 40 of about 6,104 (190)

Podrumko

open access: yes[sic], 2016
Između ponoći i jednog sata oživi sve ono za što glupi ljudi vjeruju da oživjeti ne može. Ali zaista, mnogobrojne stvari koje inače samo ukočeno i mirno leže, kao da ne mogu reći ni „dobar dan“, sve one u to vrijeme ožive. I ne brinu mnogo o tome vjeruju
Manfred Kyber, Sanja Matković
doaj   +1 more source

Is there an integrative center in the vertebrate brain-stem? A robotic evaluation of a model of the reticular formation viewed as an action selection device [PDF]

open access: yes, 2005
Neurobehavioral data from intact, decerebrate, and neonatal rats, suggests that the reticular formation provides a brainstem substrate for action selection in the vertebrate central nervous system.
Baerends, G.   +15 more
core   +2 more sources

Hardware Acceleration of Crystals-Kyber in Low-Complexity Embedded Systems With RISC-V Instruction Set Extensions

open access: yesIEEE Access
The imminent rise of practical quantum computing threatens well-established cryptography algorithms for secret key exchange in use today, such as Diffie-Hellman, RSA and Elliptic Curve based schemes.
Carlos Gewehr   +2 more
doaj   +1 more source

Robust watermarking for diffusion models using error-correcting codes and post-quantum key encapsulation

open access: yesFrontiers in Physics
Critical infrastructures increasingly rely on AI-generated content (AIGC) for monitoring, decision support, and autonomous control. This dependence creates new attack surfaces: forged maintenance imagery, manipulated diagnostic scans, or spoofed sensor ...
Xianglei Hu   +5 more
doaj   +1 more source

Password authenticated key exchange-based on Kyber for mobile devices. [PDF]

open access: yesPeerJ Comput Sci
In this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused on how the PAKE version of PQC standard Kyber with mobile compatibility can be obtained by using simple ...
Seyhan K, Akleylek S, Dursun AF.
europepmc   +6 more sources

Kyber AHE: An Easy-to-Implement Additive Homomorphic Encryption Scheme Based on Kyber and Its Application in Biometric Template Protection

open access: yesMathematics
Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the addition ...
Roberto Román   +2 more
doaj   +1 more source

Quantum Aspects of Semantic Analysis and Symbolic Artificial Intelligence

open access: yes, 2004
Modern approaches to semanic analysis if reformulated as Hilbert-space problems reveal formal structures known from quantum mechanics. Similar situation is found in distributed representations of cognitive structures developed for the purposes of neural ...
  +26 more
core   +1 more source

Forecasting and prequential validation for time varying meta-elliptical distributions [PDF]

open access: yes, 2009
We consider forecasting and prequential (predictive sequential) validation of meta-elliptical distributions with time varying parameters. Using the weak prequential principle of Dawid, we conduct model validation avoiding nuisance parameter problems ...
Nikandrova, Arina, Sancetta, A.
core   +1 more source

Alkutuotannon kyberuhat [PDF]

open access: yes, 2017
Tietotekniikan käyttö alkutuotannon prosesseissa lisääntyy nopeasti. Käytössä olevat sekä kiinteät, että liikkuvat laitteet kytketään tietoverkkoon, jotta voidaan mahdollistaa uusia toiminnallisuuksia ja tehostaa toimintaa verkottuneiden ratkaisujen ...
Laajalahti, Mikko, Nikander, Jussi
core  

Integrating Elliptic Curve Encryption and Post‐Quantum Cryptography for Secure VANETs Using Fog Computing and SDN

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper presents a hybrid security framework for vehicular ad hoc networks that combines lightweight elliptic curve cryptography with quantum‐resistant post‐quantum cryptography, coordinated through fog computing and software‐defined networking.
Adi El‐Dalahmeh   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy