Results 51 to 60 of about 6,039 (185)
Spartan Daily, January 30, 1976 [PDF]
Volume 66, Issue 3https://scholarworks.sjsu.edu/spartandaily/6034/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +2 more sources
Hamiltonian Monte Carlo Acceleration Using Surrogate Functions with Random Bases [PDF]
For big data analysis, high computational cost for Bayesian methods often limits their applications in practice. In recent years, there have been many attempts to improve computational efficiency of Bayesian inference.
Shahbaba, Babak +2 more
core +1 more source
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM
Continuous Key Agreement (CKA) is a two-party protocol used in double-ratchet protocols such as signal. It enables continuous and synchronous key distribution that generates a fresh key to encrypt each transaction in messenger apps. It guarantees forward
Joohee Lee, Jihoon Kwon, Ji Sun Shin
doaj +1 more source
Second order isomorphism: A reinterpretation and its implications in brain and cognitive sciences [PDF]
Shepard and Chipman's second order isomorphism describes how the brain may represent the relations in the world. However, a common interpretation of the theory can cause difficulties. The problem originates from the static nature of representations.
Choe, Yoonsuck
core +2 more sources
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source
Biconic semi-copulas with a given section [PDF]
Inspired by the notion of biconic semi-copulas, we introduce biconic semi-copulas with a given section. Such semi-copulas are constructed by linear interpolation on segments connecting the graph of a continuous and decreasing function to the points (0, 0)
De Baets, Bernard +3 more
core +2 more sources
Semi-compressed CRYSTALS-Kyber
In this paper, we investigate the communication overhead of the Kyber, which has recently been standardized by the National Institute of Standards and Technology (NIST). Given the same decryption failure rate (DFR) and security argument, we show it is feasible to reduce the communication overhead of the Kyber by 54%.
Shuiyin Liu, Amin Sakzad
openaire +2 more sources
Faster Kyber and Dilithium on the Cortex-M4
Contains fulltext : 253538.pdf (Publisher’s version ) (Open Access)
Abdulrahman, Amin +3 more
openaire +2 more sources
Constructing Efficient Identity‐Based Signatures on Lattices
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia +4 more
wiley +1 more source

