Results 61 to 70 of about 6,104 (190)

تسریع زمان اجرای الگوریتم رمزنگاری پساکوانتوم Crystals-Kyber روی FPGA [PDF]

open access: yesپدافند الکترونیکی و سایبری, 2023
کامپیوترهای کوانتومی توان محاسباتی خیلی بیشتری نسبت به کامپیوترهای کلاسیک دارند و این مسئله باعث ایجاد چالش در حوزه رمزنگاری کلید عمومی شده است، به طوری که پیش‌بینی می‌شود در آینده کامپیوترهای کوانتومی به اندازه‌ای قدرتمند شوند که بتوانند الگوریتم‌های ...
محمد غفاری   +2 more
doaj  

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

Cyberfeminists guerrillas: the battle from the codes [PDF]

open access: yes, 2018
Este texto propone pensar las dos décadas de ciberfeminismos como prácticas de “guerrillas semiológicas”. Para ello se analizarán las estrategias sígnicas que convierten a las ciberfeministas en guerrilleras dispuestas a dar la batalla desde el lugar ...
Salvador Agra, Saleta de
core   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink   +2 more
wiley   +1 more source

On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection

open access: yesCryptography
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa   +2 more
doaj   +1 more source

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM [PDF]

open access: yes2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digitalsignature, encryption, and key-establishment protocols, have created significant interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of CRYSTALS – Cryptographic
Bos, Joppe   +8 more
openaire   +2 more sources

Local governance networks as public authority: Insights from Mozambique, Myanmar and Pakistan

open access: yesGlobal Policy, Volume 15, Issue S4, Page 48-59, July 2024.
Abstract Drawing upon ‘governance diaries,’ a method which used repeated interviews with a set of households and intermediaries in three countries—Mozambique, Myanmar and Pakistan—to understand how marginalised groups meet their daily governance needs, we argue that local governance networks constitute a form of public authority.
Anuradha Joshi   +5 more
wiley   +1 more source

A Ruin Treatment: Social Context and human Scale at a Kingston Abattoir

open access: yesLandscape Review, 2004
Participatory design, ruin, industrial landscapes ...
Peter Butler, Ashley Kyber
doaj  

Home - About - Disclaimer - Privacy