Results 71 to 80 of about 6,039 (185)
Computational costs of numerically solving multidimensional partial differential equations (PDEs) increase significantly when the spatial dimensions of the PDEs are high, due to large number of spatial grid points. For multidimensional reaction-diffusion
Chen, Shanqin +3 more
core +1 more source
Local governance networks as public authority: Insights from Mozambique, Myanmar and Pakistan
Abstract Drawing upon ‘governance diaries,’ a method which used repeated interviews with a set of households and intermediaries in three countries—Mozambique, Myanmar and Pakistan—to understand how marginalised groups meet their daily governance needs, we argue that local governance networks constitute a form of public authority.
Anuradha Joshi +5 more
wiley +1 more source
Quantum Aspects of Semantic Analysis and Symbolic Artificial Intelligence
Modern approaches to semanic analysis if reformulated as Hilbert-space problems reveal formal structures known from quantum mechanics. Similar situation is found in distributed representations of cognitive structures developed for the purposes of neural ...
+26 more
core +1 more source
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms +9 more
wiley +1 more source
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa +2 more
doaj +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM [PDF]
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digitalsignature, encryption, and key-establishment protocols, have created significant interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of CRYSTALS – Cryptographic
Bos, Joppe +8 more
openaire +2 more sources
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang +3 more
wiley +1 more source
A Ruin Treatment: Social Context and human Scale at a Kingston Abattoir
Participatory design, ruin, industrial landscapes ...
Peter Butler, Ashley Kyber
doaj
Comparative analysis of lattice-based cryptographic schemes for secure IoT communications
This paper presents comparative analysis of lattice-based cryptographic schemes, focusing on their runtime and memory performance to evaluate their suitability for secure IoT communications.
Alvary Kefas Kwala +2 more
doaj +1 more source

