Results 71 to 80 of about 4,957 (182)
A Mathematical Perspective on Post-Quantum Cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter +3 more
doaj +1 more source
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj +1 more source
High-Speed Key Encapsulation from NTRU
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive with more recent lattice-based cryptosystems in terms of speed, key size, and ciphertext size. We present a slightly simplified version of textbook NTRU, select parameters for this encryption scheme that target the 128-bit post-quantum security level ...
Hülsing, Andreas +3 more
openaire +2 more sources
A centralized controller vulnerable to attacks is one of the security vulnerabilities and scalability issues faced by the Internet of Things (IoT)‐connected software‐defined network (SDN). Safeguard Authentication Dynamic Access Control (SANDMAC) tackles these issues by emphasizing secure access control and user and application authentication ...
Sahana D S, Brahmananda S H
wiley +1 more source
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q [PDF]
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape N = p2q. Our scheme uses a combination of modular linear and modular squaring. We show that the decryption is 1-to-1 which is a great advantage over Rabin's
Abu, Nur Azman +3 more
core
Secure data sharing technology of medical privacy data in the Web 3.0
The article proposes and implements a secure sharing model for medical privacy data based on key Web3 technologies. It constructs keyword indexes for private data, stores the source data in the Inter Planetary File System, and uses query keywords to generate trapdoors, thereby enabling the retrieval of encrypted data.
Shusheng Guo, Cheng Chen, Qing Tong
wiley +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU
NTRU (Number Theory Research Unit) has the characteristics of resistance to quantum computing attacks, fast encryption and decryption, and high security. It is very suitable for wireless confidential data networks and authentication systems.
Neng Zhou +4 more
doaj +1 more source

