Results 61 to 70 of about 2,293 (163)

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

open access: yesIET Blockchain, Volume 4, Issue 3, Page 252-262, September 2024.
Data underpins modern society and the economy, enabling informed choices and innovation. Protecting data from tampering is crucial, leading to encryption using cryptography, blockchain, and zero trust models. Quantum computing advances aid post‐quantum security, yet adoption hurdles persist.
Aditya Kumar Sharma   +3 more
wiley   +1 more source

A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q [PDF]

open access: yes, 2013
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape N = p2q. Our scheme uses a combination of modular linear and modular squaring. We show that the decryption is 1-to-1 which is a great advantage over Rabin's
Abu, Nur Azman   +3 more
core  

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

open access: yesIET Image Processing, Volume 18, Issue 4, Page 1053-1072, 27 March 2024.
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi   +2 more
wiley   +1 more source

Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]

open access: yes, 2020
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi   +8 more
core   +1 more source

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Practical NTRU Signcryption in the Standard Model. [PDF]

open access: yesEntropy (Basel), 2023
Yan J   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy