An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things. [PDF]
Hsu CL, Chen WX, Le TV.
europepmc +1 more source
Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks. [PDF]
Zhang Y, Tang Y, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Home and Clinical Cardiovascular Care Center (H4C): a Framework for Integrating Body Sensor Networks and QTRU Cryptography System. [PDF]
Zakerolhosseini A +2 more
europepmc +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
Resilience of hospitals in an age of disruptions: a systematic literature review on resources and capabilities. [PDF]
Carbonara N, Pellegrino R, De Luca C.
europepmc +1 more source
Finding shortest lattice vectors faster using quantum search. [PDF]
Laarhoven T, Mosca M, van de Pol J.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
Related searches:
Vulnerable Public Keys in NTRU Cryptosystem
Chinese Annals of Mathematics, Series B, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Liqing +3 more
openaire +2 more sources
A matrix formulation for NTRU cryptosystem
2008 16th IEEE International Conference on Networks, 2008In many business sectors sending secure information over public channels has become a challenging task. Data encryption is not the most efficient method to counteract attacks by adversaries. One form of encryption is to use the same key by the sender for encryption as well as the receiver for decryption.
Rakesh Nayak +2 more
openaire +1 more source

