Results 61 to 70 of about 6,104 (190)
تسریع زمان اجرای الگوریتم رمزنگاری پساکوانتوم Crystals-Kyber روی FPGA [PDF]
کامپیوترهای کوانتومی توان محاسباتی خیلی بیشتری نسبت به کامپیوترهای کلاسیک دارند و این مسئله باعث ایجاد چالش در حوزه رمزنگاری کلید عمومی شده است، به طوری که پیشبینی میشود در آینده کامپیوترهای کوانتومی به اندازهای قدرتمند شوند که بتوانند الگوریتمهای ...
محمد غفاری +2 more
doaj
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
Cyberfeminists guerrillas: the battle from the codes [PDF]
Este texto propone pensar las dos décadas de ciberfeminismos como prácticas de “guerrillas semiológicas”. Para ello se analizarán las estrategias sígnicas que convierten a las ciberfeministas en guerrilleras dispuestas a dar la batalla desde el lugar ...
Salvador Agra, Saleta de
core +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink +2 more
wiley +1 more source
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa +2 more
doaj +1 more source
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM [PDF]
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digitalsignature, encryption, and key-establishment protocols, have created significant interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of CRYSTALS – Cryptographic
Bos, Joppe +8 more
openaire +2 more sources
Local governance networks as public authority: Insights from Mozambique, Myanmar and Pakistan
Abstract Drawing upon ‘governance diaries,’ a method which used repeated interviews with a set of households and intermediaries in three countries—Mozambique, Myanmar and Pakistan—to understand how marginalised groups meet their daily governance needs, we argue that local governance networks constitute a form of public authority.
Anuradha Joshi +5 more
wiley +1 more source
A Ruin Treatment: Social Context and human Scale at a Kingston Abattoir
Participatory design, ruin, industrial landscapes ...
Peter Butler, Ashley Kyber
doaj

