Results 101 to 110 of about 4,998 (181)

Pathways to the co-management of protected areas and native title in Australia [PDF]

open access: yes
In recent decades, various forms of co-management of national parks and other protected areas by governments and Indigenous people have come to the fore.
Chris Haynes   +2 more
core  

Calculation of complexity of NTRU and optimized NTRU using GA, ACO, and PSO algorithm

open access: yesSecurity and Communication Networks, 2016
AbstractA great security of information for the e‐business applications is required. In such applications, use of cryptographic methods is very necessary. The two popularly used cryptographic methods are secret key cryptosystem and public key cryptosystem. Data encryption standard is the most popular secret key cryptosystem.
Himani Agrawal, Monisha Sharma
openaire   +1 more source

Security Analysis of DBTRU Cryptosystem. [PDF]

open access: yesEntropy (Basel), 2022
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc   +1 more source

Integrated NTT-Karatsuba for fast multiplication of NTRU Algorithm

open access: yesJITeCS (Journal of Information Technology and Computer Science)
The increasing threat of attacks from quantum computers requires the development of more efficient and secure post-quantum cryptographic algorithms, one of which is NTRU.
Muhammad Fathan Rivaldi   +2 more
doaj   +1 more source

Implementation of a Secure 32-bit RISC-V Microcontroller Integrated With a Fast Lightweight Post-Quantum NTRU-HPS Cryptosystem for IoT

open access: yesIEEE Access
The emergence of large-scale quantum computers threatens the long-term security of classical public-key cryptosystems, making the integration of post-quantum cryptography (PQC) essential for resource-constrained embedded and IoT platforms.
Tri-Duc Ta   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy