Results 41 to 50 of about 9,817 (168)
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann +6 more
doaj +1 more source
Through a comparison of adolescent experience in Manggarai, eastern Indonesia, and amongst children of migrants in Sabah, Malaysia, this article argues for the value of attending to the spatiality of adolescence as a period of transition. Biocultural development expands both adolescents’ concrete experiences of mobility and their sense of the ...
Catherine Allerton
wiley +1 more source
CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR).
Stefano Di Matteo +2 more
doaj +1 more source
Area-Efficient Polynomial Multiplication Hardware Implementation for Lattice-based Cryptography [PDF]
Lattice-based post-quantum cryptography algorithms demonstrate significant potential in public-key cryptography. A key performance bottleneck in hardware implementation is the computational complexity of polynomial multiplication. To address the problems
XIE Jiaxing, PU Jinwei, FANG Weitian, ZHENG Xin, XIONG Xiaoming
doaj +1 more source
Density‐Valued ARMA Models by Spline Mixtures
ABSTRACT This paper proposes a novel framework for modeling time series of probability density functions by extending autoregressive moving average (ARMA) models to density‐valued data. The method is based on a transformation approach, wherein each density function on a compact domain [0,1]d$$ {\left[0,1\right]}^d $$ is approximated by a B‐spline ...
Yasumasa Matsuda, Rei Iwafuchi
wiley +1 more source
Risks for human health related to the presence of plant lectins in food
Abstract The European Commission asked the European Food Safety Authority (EFSA) to assess the risk related to the presence of plant lectins in food. Based on the available evidence, the CONTAM Panel considered only phytohaemagglutinin (PHA), a legume lectin from beans (Phaseolus sp.), for the risk characterisation.
EFSA Panel on Contaminants in the Food Chain (CONTAM) +30 more
wiley +1 more source
A novel MRASMC framework is developed, with a sliding surface derived from a regressive structure and parameters adaptively updated. An adaptive trigger condition enhances disturbance rejection without requiring complex observers or full system models.
Nhut Thang Le +4 more
wiley +1 more source
Zero-knowledge proof is a critical cryptographic primitive. Its most practical type, called zero-knowledge Succinct Non-interactive ARgument of Knowledge (zkSNARK), has been deployed in various privacy-preserving applications such as cryptocurrencies ...
Tao Lu +7 more
doaj +1 more source
Hydrothermal carbonization is the ideal methodology to transform biomass waste into green electrodes for sustainable energy storage devices such as lithium‐ion batteries, sodium‐ion batteries, and supercapacitors. Abstract The demand for valuable and sustainable chemicals and nonfossil fuels, with a carbon‐neutral or zero‐carbon footprint from zero ...
Hong Duc Pham +7 more
wiley +1 more source
ABSTRACT This study examines tail risk transmission across Indian stock sectors, employing the conditional autoregressive value‐at‐risk (CAViaR) model and time‐varying parameter vector autoregression (TVP‐VAR) methodology. We uncover substantial interconnectedness, with total connectedness indices (TCIs) for both negative and positive tail risks ...
Son Duy Pham +2 more
wiley +1 more source

