Results 71 to 80 of about 6,104 (190)

Comparative analysis of lattice-based cryptographic schemes for secure IoT communications

open access: yesDiscover Internet of Things
This paper presents comparative analysis of lattice-based cryptographic schemes, focusing on their runtime and memory performance to evaluate their suitability for secure IoT communications.
Alvary Kefas Kwala   +2 more
doaj   +1 more source

Numerical simulation of growth of Escherichia coli in unsaturated porous media [PDF]

open access: yes, 2014
A model for the aerobic and anaerobic growth of Escherichia coli (HB101 K12 pGLO) depending on the concentration of oxygen and DOC as substrate has been developed based on laboratory batch experiments.
Bastian, Peter   +5 more
core  

CRYSTALS-Kyber With Lattice Quantizer

open access: yes2024 IEEE International Symposium on Information Theory (ISIT)
Module Learning with Errors (M-LWE) based key reconciliation mechanisms (KRM) can be viewed as quantizing an M-LWE sample according to a lattice codebook. This paper describes a generic M-LWE-based KRM framework, valid for any dimensional lattices and any modulus $q$ without a dither. Our main result is an explicit upper bound on the decryption failure
Liu, Shuiyin, Sakzad, Amin
openaire   +2 more sources

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 4, April 2024.
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms   +9 more
wiley   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Noise suppressing sensor encoding and neural signal orthonormalization [PDF]

open access: yes, 2010
In this paper we regard first the situation where parallel channels are disturbed by noise. With the goal of maximal information conservation we deduce the conditions for a transform which "immunizes" the channels against noise influence before the ...
Brause, Rüdiger W., Rippl, Michael
core  

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang   +4 more
doaj   +1 more source

Second order isomorphism: A reinterpretation and its implications in brain and cognitive sciences [PDF]

open access: yes, 2002
Shepard and Chipman's second order isomorphism describes how the brain may represent the relations in the world. However, a common interpretation of the theory can cause difficulties. The problem originates from the static nature of representations.
Choe, Yoonsuck
core   +2 more sources

Pattern formation in a diffusion-ODE model with hysteresis [PDF]

open access: yes, 2013
Coupling diffusion process of signaling molecules with nonlinear interactions of intracellular processes and cellular growth/transformation leads to a system of reaction-diffusion equations coupled with ordinary differential equations (diffusion-ODE ...
Marciniak-Czochra, Anna   +2 more
core  

Home - About - Disclaimer - Privacy