Results 31 to 40 of about 560 (65)

Superposed epoch study of ICME sub-structures near Earth and their effects on galactic cosmic rays

open access: yes, 2016
Interplanetary coronal mass ejections (ICMEs) are the interplanetary manifestations of solar eruptions. The overtaken solar wind forms a sheath of compressed plasma at the front of ICMEs.
Dasso, S.   +4 more
core   +3 more sources

Eliminating Variables in Boolean Equation Systems [PDF]

open access: yes, 2017
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar   +3 more
core   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Search for WZ resonances in the fully leptonic channel using pp collisions at s=8 TeV with the ATLAS detector [PDF]

open access: yes, 2014
A search for resonant WZ production in the ℓνℓ'ℓ' (ℓ,ℓ'=e,μ) decay channel using 20.3 fb-1 of s=8TeV pp collision data collected by the ATLAS experiment at LHC is presented.
ATLAS Collaboration   +35 more
core   +2 more sources

Scaling Mobile Private Contact Discovery to Billions of Users [PDF]

open access: yes, 2023
Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing contacts are registered with the service.
Hetz, Laura   +2 more
core   +1 more source

High-Performance Hardware Implementation of MPCitH and Picnic3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Picnic is a post-quantum digital signature, the security of which relies solely on symmetric-key primitives such as block ciphers and hash functions instead of number theoretic assumptions. One of the main concerns of Picnic is the large signature size.
Guoxiao Liu   +3 more
doaj   +1 more source

A Survey of Quantum-safe Digital Signatures and their building blocks [PDF]

open access: yes, 2021
Sikkerhet og personvern på internett som vi kjenner i dag, er truet av den nye teknologien for å bygge større og kommersielle kvantecomputere. Selv om kvantecomputere som er bygget er relativt små, og ikke veldig effektive for å forstyrre Public Key ...
Sridhar, Sahana
core  

Efficient implementation of LowMC in HElib

open access: yes, 2018
LowMC is a symmetric block cipher designed for fully homomorphic encryption. This thesis focuses on Martin Albrecht’s implementation of the cipher in the FHE library HElib, and how his implementation can be improved when encrypting a single plaintext.
openaire   +2 more sources

Symmetric Ciphers for Fully Homomorphic Encryption [PDF]

open access: yes, 2020
Fully homomorphic encryption is the latest addition to the world of cryptography. It is a type of encryption that allows operations to be done on ciphertexts, which is not possible with traditional encryption. The field has gained a lot of traction since
Thorvaldsen, Håkon
core  

Efficient implementation of LowMC in HElib [PDF]

open access: yes, 2019
Postponed access: the file will be accessible after 2019-05-29LowMC is a symmetric block cipher designed for fully homomorphic encryption. This thesis focuses on Martin Albrecht’s implementation of the cipher in the FHE library HElib, and how his ...
Francis, Isabel Thevahi
core  

Home - About - Disclaimer - Privacy