Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0
Data underpins modern society and the economy, enabling informed choices and innovation. Protecting data from tampering is crucial, leading to encryption using cryptography, blockchain, and zero trust models. Quantum computing advances aid post‐quantum security, yet adoption hurdles persist.
Aditya Kumar Sharma +3 more
wiley +1 more source
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q [PDF]
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape N = p2q. Our scheme uses a combination of modular linear and modular squaring. We show that the decryption is 1-to-1 which is a great advantage over Rabin's
Abu, Nur Azman +3 more
core
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi +2 more
wiley +1 more source
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi +8 more
core +1 more source
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph +4 more
core +1 more source
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism. [PDF]
Seyhan K, Akleylek S.
europepmc +1 more source
Practical NTRU Signcryption in the Standard Model. [PDF]
Yan J +5 more
europepmc +1 more source

