Results 91 to 100 of about 2,659 (196)

On the ideal shortest vector problem over random rational primes [PDF]

open access: yes, 2021
Any ideal in a number field can be factored into a product of prime ideals. In this paper we study the prime ideal shortest vector problem (SVP) in the ring $ \Z[x]/(x^{2^n} + 1) $, a popular choice in the design of ideal lattice based cryptosystems.
Cheng, Qi   +3 more
core   +1 more source

Post-Quantum Universal Composable OT Based on Key Exchange

open access: yesIEEE Access, 2020
We construct a universal composable framework for two-message oblivious transfer protocols based on lattice-assumption. Compared with the paper proposed by Liu and Hu, we modify a framework proposed by Liu and Hu by adding three tools, which are XOR, Bit
Ding Hangchao, Han Jiang, Qiuliang Xu
doaj   +1 more source

Heatwaves on the Rise: The Role of El Niño‐Southern Oscillation and Local Water‐Energy Exchanges in Shaping Global Patterns

open access: yesJournal of Geophysical Research: Atmospheres, Volume 130, Issue 17, 16 September 2025.
Abstract Large‐scale and intense heatwaves pose significant risks to ecosystems and human society due to associated heat and water stress. Heatwaves can be classified as daytime, nighttime, and compound, depending on their occurrence time. However, the factors shaping global spatiotemporal patterns of heatwaves remain poorly understood, especially ...
Kun Zhang   +8 more
wiley   +1 more source

Modification of Frodokem Using Gray and Error-Correcting Codes

open access: yesIEEE Access, 2019
Lattice-based cryptography is one of the most promising schemes for post-quantum cryptography. Among the many lattice-based cryptosystems, FrodoKEM is a well-known key-encapsulation mechanism (KEM) based on (plain) learning with errors (LWE) problems and
Eunsang Lee   +4 more
doaj   +1 more source

Algorithms on Ideal over Complex Multiplication order [PDF]

open access: yes, 2016
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and even to a more general structure.
Kirchner, Paul
core   +1 more source

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

open access: yesEURASIP Journal on Information Security
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly ...
Lin Yang
doaj   +1 more source

Protocolos para votaciones electrónicas [PDF]

open access: yes, 2017
Propuesta de protocolo para una prueba de conocimiento nulo para verificar el correcto funcionamiento de un nodo mixnet en un esquema de votación electrónica que utiliza un cifrado post-cuántico basado en retículos.
Martínez Pinilla, Ramiro
core  

Estimation of Coupled Ocean/Atmosphere Impacts to the Satellite Detection of Nocturnal Maritime Low Clouds

open access: yesGeophysical Research Letters, Volume 52, Issue 14, 28 July 2025.
Abstract Accurate observations of maritime low clouds are important for air and sea transportation, understanding boundary layer processes, and measuring Earth's radiation budget. The nighttime maritime low cloud extent is often determined in meteorological satellite imagery using the brightness‐temperature difference between the longwave infrared (e.g.
Jesse D. Turner   +6 more
wiley   +1 more source

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]

open access: yes, 2013
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core  

Home - About - Disclaimer - Privacy