Results 41 to 50 of about 18,842 (275)

BAT: Small and Fast KEM over NTRU Lattices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present BAT – an IND-CCA secure key encapsulation mechanism (KEM) that is based on NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs.
Pierre-Alain Fouque   +3 more
doaj   +1 more source

A new exact closest lattice point search algorithm using linear constraints [PDF]

open access: yes, 2007
The problem of finding the closest lattice point arises in several communications scenarios and is known to be NP-hard. We propose a new closest lattice point search algorithm which utilizes a set of new linear inequality constraints to reduce the search
Hassibi, Babak, Xu, Weiyu
core   +1 more source

Research Status, Challenges, and Future Development of Post-Quantum Cryptography [PDF]

open access: yes中国工程科学
As an important strategic resource for safeguarding national information security and the healthy development of digital economy, cryptography is the cornerstone of protecting the security of critical infrastructure, government affairs data, financial ...
Guizhen Zhu   +5 more
doaj   +1 more source

Improvements on Making BKW Practical for Solving LWE

open access: yesCryptography, 2021
The learning with errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum–Kalai–Wasserman (BKW) algorithm. This paper presents new improvements of BKW-
Alessandro Budroni   +4 more
doaj   +1 more source

Quantum key distribution without the wavefunction [PDF]

open access: yes, 2016
A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a
Niestegge, Gerd
core   +3 more sources

Harnessing Fungal Biowelding for Constructing Mycelium‐Engineered Materials

open access: yesAdvanced Engineering Materials, EarlyView.
Mycelium‐bound composites (MBCs) offer low‐carbon alternatives for construction, yet interfacial bonding remains a critical challenge. This review examines fungal biowelding as a biocompatible adhesive, elucidating mycelium‐mediated interfacial mechanisms and their role in material assembly. Strategies to optimize biowelding are discussed, highlighting
Xue Brenda Bai   +2 more
wiley   +1 more source

A survey on lattice-based digital signature

open access: yesCybersecurity
Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an important tool for constructing cryptography ...
Fengxia Liu   +7 more
doaj   +1 more source

A Practical View of the State-of-the-Art of Lattice-Based Cryptanalysis

open access: yesIEEE Access, 2017
This paper describes the lattice problems that are key in the study of lattice-based cryptography, identifies and categorizes methods for solving these problems, analyzes existing implementations of these algorithms, and extrapolates on the future of ...
Artur Mariano   +4 more
doaj   +1 more source

On the Lightweight Potential of Laser Additive Manufactured NiTi Triply Periodic Minimal Sheet Lattices

open access: yesAdvanced Engineering Materials, EarlyView.
This study explores the lightweight potential of laser additive‐manufactured NiTi triply periodic minimal surface sheet lattices. It systematically investigates the effects of relative density and unit cell size on surface quality, deformation recovery, compression behavior, and energy absorption.
Haoming Mo   +3 more
wiley   +1 more source

Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms

open access: yesIEEE Access
Lattice-based post-quantum cryptography (PQC) has attracted significant attention as a promising solution to the security challenges posed by quantum computing.
Hien Nguyen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy