Results 71 to 80 of about 2,451 (171)

Accelerating Number Theoretic Transformations for Bootstrappable Homomorphic Encryption on GPUs

open access: yes, 2020
Homomorphic encryption (HE) draws huge attention as it provides a way of privacy-preserving computations on encrypted messages. Number Theoretic Transform (NTT), a specialized form of Discrete Fourier Transform (DFT) in the finite field of integers, is ...
Ahn, Jung Ho   +3 more
core   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: yesIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +1 more source

Security of quantum key distribution with iterative sifting

open access: yes, 2017
Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals.
Azuma, Koji   +6 more
core   +1 more source

Risks for human health related to the presence of plant lectins in food

open access: yesEFSA Journal, Volume 24, Issue 1, January 2026.
Abstract The European Commission asked the European Food Safety Authority (EFSA) to assess the risk related to the presence of plant lectins in food. Based on the available evidence, the CONTAM Panel considered only phytohaemagglutinin (PHA), a legume lectin from beans (Phaseolus sp.), for the risk characterisation.
EFSA Panel on Contaminants in the Food Chain (CONTAM)   +30 more
wiley   +1 more source

Optimized implementation of SMAUG-T on resource-constrained 16-bit MSP430 MCU

open access: yesICT Express
In this paper, we present an optimized implementation of SMAUG-T, one of Round 2 Key Encapsulation Mechanism algorithms in Korean Post-quantum Cryptography Competition, on a widely used 16-bit MSP430 MCU.
MinGi Kim   +4 more
doaj   +1 more source

Hardware Acceleration of Number Theoretic Transform in zk-SNARK [PDF]

open access: yesJisuanji kexue yu tansuo
The proof in zk-SNARK has a fixed length and can be verified quickly, promoting the application of zero-knowledge proof in areas such as digital signature, blockchain, distributed storage, and outsourced computing.
ZHAO Haixu, CHAI Zhilei, HUA Pengcheng, WANG Feng, DING Dong
doaj   +1 more source

A Hybrid Model Reference Adaptive and Regressive‐Form Sliding Mode Control in Discrete Domain: Robustness Under System Uncertainty

open access: yesEngineering Reports, Volume 7, Issue 12, December 2025.
A novel MRASMC framework is developed, with a sliding surface derived from a regressive structure and parameters adaptively updated. An adaptive trigger condition enhances disturbance rejection without requiring complex observers or full system models.
Nhut Thang Le   +4 more
wiley   +1 more source

Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme

open access: yesInformation
In the modern era of the Internet of Things (IoT), especially with the rapid development of quantum computers, the implementation of postquantum cryptography algorithms in numerous terminals allows them to defend against potential future quantum attack ...
Binh Kieu-Do-Nguyen   +6 more
doaj   +1 more source

Toward Sustainable and High‐Performing Energy Storage from Biomass Waste Through Hydrothermal Carbonization

open access: yesSmall, Volume 21, Issue 50, December 17, 2025.
Hydrothermal carbonization is the ideal methodology to transform biomass waste into green electrodes for sustainable energy storage devices such as lithium‐ion batteries, sodium‐ion batteries, and supercapacitors. Abstract The demand for valuable and sustainable chemicals and nonfossil fuels, with a carbon‐neutral or zero‐carbon footprint from zero ...
Hong Duc Pham   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy