Contributions to the hardness foundations of lattice-based cryptography
La cryptographie sur les réseaux est l’une des approches les plus compétitives pour protéger la confidentialité, dans les applications actuelles et l’ère post-quantique. Le problème central qui sert de fondement de complexité de la cryptographie sur réseaux est Learning with Errors (LWE).
openaire +3 more sources
High‐Performance Phototransistor Based on a 2D Polybenzimidazole Polymer
A crystalline 2D polybenzimidazole polymer (2DPBI), incorporating a porphyrin‐based π‐system linked via 1,3‐diazole units, is synthesized on the water surface over large areas. The 2DPBI thin‐film exhibits high charge carrier mobility (≈240 cm2 V−1 s−1, measured by terahertz spectroscopy), strong photoresponse, and band‐like transport, enabling ...
Anupam Prasoon+20 more
wiley +1 more source
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
On the Performance and Robustness of Code- and Lattice-based Cryptography
Today, the information security of most digital services relies on well-researched cryptographic schemes. The engineering of secure and efficient implementations of these schemes is also well understood. Optimized cryptographic software libraries run on general-purpose processors and microcontrollers; dedicated hardware designs accelerate specific ...
openaire +2 more sources
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
In Situ Manipulation of Growth Mechanisms in the Vapor–Solid–Solid Growth of GaP Nanowires
The direct observation of the Ni‐assisted GaP nanowire growth process via transmission electron microscopy reveals two different growth mechanisms by Trimethylgallium (TMGa) precursor supply variations. The decrease of TMGa flow results in the formation of Ni2P phase as growth promoters with cation exchange reaction in addition to interface diffusion ...
Tianyi Hu+6 more
wiley +1 more source
An efficient lattice-based integrated revocable identity-based encryption. [PDF]
Huang H, Li J, Bi S, Yuan Q.
europepmc +1 more source
New key management scheme lattice-based for clustered wireless sensor networks. [PDF]
Zhang J, Liu Q.
europepmc +1 more source
A two‐stage sorption mechanism is proposed for Al‐doped HMnO in direct lithium extraction. Batch sorption experiments and modeling identify two key sorption sites on Al‐HMnO: surface sites (planar and edge) and vacancy sites (W). At pH 12, Stage I involves surface ion exchange, followed by Stage II, where surface complexation occurs between Li⁺ ions ...
Shuxuan Yan+6 more
wiley +1 more source
Distributed Identity Authentication with Lenstra-Lenstra-Lovász Algorithm-Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem. [PDF]
Yuan Q+6 more
europepmc +1 more source