Results 71 to 80 of about 6,104 (190)
Comparative analysis of lattice-based cryptographic schemes for secure IoT communications
This paper presents comparative analysis of lattice-based cryptographic schemes, focusing on their runtime and memory performance to evaluate their suitability for secure IoT communications.
Alvary Kefas Kwala +2 more
doaj +1 more source
Numerical simulation of growth of Escherichia coli in unsaturated porous media [PDF]
A model for the aerobic and anaerobic growth of Escherichia coli (HB101 K12 pGLO) depending on the concentration of oxygen and DOC as substrate has been developed based on laboratory batch experiments.
Bastian, Peter +5 more
core
CRYSTALS-Kyber With Lattice Quantizer
Module Learning with Errors (M-LWE) based key reconciliation mechanisms (KRM) can be viewed as quantizing an M-LWE sample according to a lattice codebook. This paper describes a generic M-LWE-based KRM framework, valid for any dimensional lattices and any modulus $q$ without a dither. Our main result is an explicit upper bound on the decryption failure
Liu, Shuiyin, Sakzad, Amin
openaire +2 more sources
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms +9 more
wiley +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
Noise suppressing sensor encoding and neural signal orthonormalization [PDF]
In this paper we regard first the situation where parallel channels are disturbed by noise. With the goal of maximal information conservation we deduce the conditions for a transform which "immunizes" the channels against noise influence before the ...
Brause, Rüdiger W., Rippl, Michael
core
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang +3 more
wiley +1 more source
Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang +4 more
doaj +1 more source
Second order isomorphism: A reinterpretation and its implications in brain and cognitive sciences [PDF]
Shepard and Chipman's second order isomorphism describes how the brain may represent the relations in the world. However, a common interpretation of the theory can cause difficulties. The problem originates from the static nature of representations.
Choe, Yoonsuck
core +2 more sources
Pattern formation in a diffusion-ODE model with hysteresis [PDF]
Coupling diffusion process of signaling molecules with nonlinear interactions of intracellular processes and cellular growth/transformation leads to a system of reaction-diffusion equations coupled with ordinary differential equations (diffusion-ODE ...
Marciniak-Czochra, Anna +2 more
core

