Results 61 to 70 of about 6,039 (185)
The remarkable performance capabilities of AI accelerators offer promising opportunities for accelerating cryptographic algorithms, particularly in the context of lattice-based cryptography.
Tian Zhou +7 more
doaj +1 more source
Visual representation of post-quantum cryptographic algorithm Kyber [PDF]
Cryptographic algorithms form the foundation of protocols and applications that ensure confidentiality, integrity, and availability in modern information and communication technologies.
Vujnić Aleksa D. +2 more
doaj +1 more source
Media Pedagogics as Social Engineering in the Digital-Cybernetic Age? Cybernetics, System Theory, and Social Criticism in Dieter Baacke's Kommunikation und Kompetenz (Communication and Competence) [PDF]
Ausgehend von Dieter Baackes Habilitationsschrift «Kommunikation und Kompetenz» (1972/1973) werden in diesem Artikel die Forschungsergebnisse eines Close Readings von Baackes Diskursbegründung der Medienpädagogik präsentiert, das seine Theoriebildung ...
Barberi, Alessandro
core +2 more sources
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
تسریع زمان اجرای الگوریتم رمزنگاری پساکوانتوم Crystals-Kyber روی FPGA [PDF]
کامپیوترهای کوانتومی توان محاسباتی خیلی بیشتری نسبت به کامپیوترهای کلاسیک دارند و این مسئله باعث ایجاد چالش در حوزه رمزنگاری کلید عمومی شده است، به طوری که پیشبینی میشود در آینده کامپیوترهای کوانتومی به اندازهای قدرتمند شوند که بتوانند الگوریتمهای ...
محمد غفاری +2 more
doaj
Tietotekniikan käyttö alkutuotannon prosesseissa lisääntyy nopeasti. Käytössä olevat sekä kiinteät, että liikkuvat laitteet kytketään tietoverkkoon, jotta voidaan mahdollistaa uusia toiminnallisuuksia ja tehostaa toimintaa verkottuneiden ratkaisujen ...
Laajalahti, Mikko, Nikander, Jussi
core
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
We present new speed records on the Armv8-A architecture for the latticebased schemes Dilithium, Kyber, and Saber. The core novelty in this paper is the combination of Montgomery multiplication and Barrett reduction resulting in “Barrett multiplication ...
Hanno Becker +4 more
doaj +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink +2 more
wiley +1 more source

