Results 61 to 70 of about 6,039 (185)

ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The remarkable performance capabilities of AI accelerators offer promising opportunities for accelerating cryptographic algorithms, particularly in the context of lattice-based cryptography.
Tian Zhou   +7 more
doaj   +1 more source

Visual representation of post-quantum cryptographic algorithm Kyber [PDF]

open access: yesTehnika
Cryptographic algorithms form the foundation of protocols and applications that ensure confidentiality, integrity, and availability in modern information and communication technologies.
Vujnić Aleksa D.   +2 more
doaj   +1 more source

Media Pedagogics as Social Engineering in the Digital-Cybernetic Age? Cybernetics, System Theory, and Social Criticism in Dieter Baacke's Kommunikation und Kompetenz (Communication and Competence) [PDF]

open access: yes, 2017
Ausgehend von Dieter Baackes Habilitationsschrift «Kommunikation und Kompetenz» (1972/1973) werden in diesem Artikel die Forschungsergebnisse eines Close Readings von Baackes Diskursbegründung der Medienpädagogik präsentiert, das seine Theoriebildung ...
Barberi, Alessandro
core   +2 more sources

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

تسریع زمان اجرای الگوریتم رمزنگاری پساکوانتوم Crystals-Kyber روی FPGA [PDF]

open access: yesپدافند الکترونیکی و سایبری, 2023
کامپیوترهای کوانتومی توان محاسباتی خیلی بیشتری نسبت به کامپیوترهای کلاسیک دارند و این مسئله باعث ایجاد چالش در حوزه رمزنگاری کلید عمومی شده است، به طوری که پیش‌بینی می‌شود در آینده کامپیوترهای کوانتومی به اندازه‌ای قدرتمند شوند که بتوانند الگوریتم‌های ...
محمد غفاری   +2 more
doaj  

Alkutuotannon kyberuhat [PDF]

open access: yes, 2017
Tietotekniikan käyttö alkutuotannon prosesseissa lisääntyy nopeasti. Käytössä olevat sekä kiinteät, että liikkuvat laitteet kytketään tietoverkkoon, jotta voidaan mahdollistaa uusia toiminnallisuuksia ja tehostaa toimintaa verkottuneiden ratkaisujen ...
Laajalahti, Mikko, Nikander, Jussi
core  

Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We present new speed records on the Armv8-A architecture for the latticebased schemes Dilithium, Kyber, and Saber. The core novelty in this paper is the combination of Montgomery multiplication and Barrett reduction resulting in “Barrett multiplication ...
Hanno Becker   +4 more
doaj   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy