Results 71 to 80 of about 6,039 (185)

Krylov implicit integration factor discontinuous Galerkin methods on sparse grids for high dimensional reaction-diffusion equations

open access: yes, 2018
Computational costs of numerically solving multidimensional partial differential equations (PDEs) increase significantly when the spatial dimensions of the PDEs are high, due to large number of spatial grid points. For multidimensional reaction-diffusion
Chen, Shanqin   +3 more
core   +1 more source

Local governance networks as public authority: Insights from Mozambique, Myanmar and Pakistan

open access: yesGlobal Policy, Volume 15, Issue S4, Page 48-59, July 2024.
Abstract Drawing upon ‘governance diaries,’ a method which used repeated interviews with a set of households and intermediaries in three countries—Mozambique, Myanmar and Pakistan—to understand how marginalised groups meet their daily governance needs, we argue that local governance networks constitute a form of public authority.
Anuradha Joshi   +5 more
wiley   +1 more source

Quantum Aspects of Semantic Analysis and Symbolic Artificial Intelligence

open access: yes, 2004
Modern approaches to semanic analysis if reformulated as Hilbert-space problems reveal formal structures known from quantum mechanics. Similar situation is found in distributed representations of cognitive structures developed for the purposes of neural ...
  +26 more
core   +1 more source

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 4, April 2024.
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms   +9 more
wiley   +1 more source

On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection

open access: yesCryptography
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa   +2 more
doaj   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM [PDF]

open access: yes2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digitalsignature, encryption, and key-establishment protocols, have created significant interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of CRYSTALS – Cryptographic
Bos, Joppe   +8 more
openaire   +2 more sources

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

A Ruin Treatment: Social Context and human Scale at a Kingston Abattoir

open access: yesLandscape Review, 2004
Participatory design, ruin, industrial landscapes ...
Peter Butler, Ashley Kyber
doaj  

Comparative analysis of lattice-based cryptographic schemes for secure IoT communications

open access: yesDiscover Internet of Things
This paper presents comparative analysis of lattice-based cryptographic schemes, focusing on their runtime and memory performance to evaluate their suitability for secure IoT communications.
Alvary Kefas Kwala   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy