Results 41 to 50 of about 6,039 (185)
Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the addition ...
Roberto Román +2 more
doaj +1 more source
Towards Designing Artificial Universes for Artificial Agents under Interaction Closure [PDF]
We are interested in designing artificial universes for artificial agents. We view artificial agents as networks of highlevel processes on top of of a low-level detailed-description system.
Biehl, Martin +2 more
core +3 more sources
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre +3 more
doaj +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Palindromic closures using multiple antimorphisms
Generalized pseudostandard word $\bf u$, as introduced in 2006 by de Luca and De Luca, is given by a directive sequence of letters from an alphabet ${\cal A}$ and by a directive sequence of involutory antimorphisms acting on ${\cal A}^*$.
Jajcayová, Tatiana +2 more
core +1 more source
Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat +3 more
wiley +1 more source
Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Daniel Christian Lawo +6 more
doaj +1 more source
Representation of States on Effect-Tribes and Effect Algebras by Integrals [PDF]
We describe $\sigma$-additive states on effect-tribes by integrals. Effect-tribes are monotone $\sigma$-complete effect algebras of functions where operations are defined by points.
Dvurečenskij, Anatolij
core +1 more source
In this study, breast tissue–mimicking phantoms were developed to simulate the electrical conductivity, permittivity, and speed of sound of breast fat, glandular tissue, and tumors within the 1–8 MHz range for magneto‐acousto electrical tomography (MAET) experiments.
Reyhan Zengin, Nevzat Güneri Gençer
wiley +1 more source
High-speed Parallel Implementation of Lattice-based Cryptography Based on AVX512 [PDF]
The rapid development of quantum computing seriously threatens the security of widely used public-key cryptography. Lattice-based cryptography occupies an essential position in Post-Quantum Cryptography(PQC) owing to its excellent anti-quantum security ...
Douwei LEI, Debiao HE, Min LUO, Cong PENG
doaj +1 more source

