Results 171 to 180 of about 92,027 (211)

A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem. [PDF]

open access: yesHeliyon
Yusof SN   +6 more
europepmc   +1 more source

A primer for quantum computing and its applications to healthcare and biomedical research. [PDF]

open access: yesJ Am Med Inform Assoc
Durant TJS   +8 more
europepmc   +1 more source

Computational challenges and solutions: Prime number generation for enhanced data security. [PDF]

open access: yesPLoS One
Ezz-Eldien A   +6 more
europepmc   +1 more source

Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities. [PDF]

open access: yesSensors (Basel)
Yigit Y   +8 more
europepmc   +1 more source

High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography

IEEE Symposium on Computer Arithmetic, 2021
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar   +2 more
semanticscholar   +1 more source

Reliable Architectures for Finite Field Multipliers Using Cyclic Codes on FPGA Utilized in Classic and Post-Quantum Cryptography

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023
Fault detection is becoming greatly important in protecting cryptographic designs that can suffer from both natural or malicious faults. Finite fields over $\text {GF}(2^{m})$ are widely used in such designs, since their data are coded in binary form for
Alvaro Cintas-Canto   +2 more
semanticscholar   +1 more source

Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

International Conference on Information Networking, 2023
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar   +4 more
semanticscholar   +1 more source

Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography

IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy