Results 91 to 100 of about 2,659 (196)
On the ideal shortest vector problem over random rational primes [PDF]
Any ideal in a number field can be factored into a product of prime ideals. In this paper we study the prime ideal shortest vector problem (SVP) in the ring $ \Z[x]/(x^{2^n} + 1) $, a popular choice in the design of ideal lattice based cryptosystems.
Cheng, Qi +3 more
core +1 more source
Post-Quantum Universal Composable OT Based on Key Exchange
We construct a universal composable framework for two-message oblivious transfer protocols based on lattice-assumption. Compared with the paper proposed by Liu and Hu, we modify a framework proposed by Liu and Hu by adding three tools, which are XOR, Bit
Ding Hangchao, Han Jiang, Qiuliang Xu
doaj +1 more source
Abstract Large‐scale and intense heatwaves pose significant risks to ecosystems and human society due to associated heat and water stress. Heatwaves can be classified as daytime, nighttime, and compound, depending on their occurrence time. However, the factors shaping global spatiotemporal patterns of heatwaves remain poorly understood, especially ...
Kun Zhang +8 more
wiley +1 more source
Modification of Frodokem Using Gray and Error-Correcting Codes
Lattice-based cryptography is one of the most promising schemes for post-quantum cryptography. Among the many lattice-based cryptosystems, FrodoKEM is a well-known key-encapsulation mechanism (KEM) based on (plain) learning with errors (LWE) problems and
Eunsang Lee +4 more
doaj +1 more source
Algorithms on Ideal over Complex Multiplication order [PDF]
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and even to a more general structure.
Kirchner, Paul
core +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly ...
Lin Yang
doaj +1 more source
Protocolos para votaciones electrónicas [PDF]
Propuesta de protocolo para una prueba de conocimiento nulo para verificar el correcto funcionamiento de un nodo mixnet en un esquema de votación electrónica que utiliza un cifrado post-cuántico basado en retículos.
Martínez Pinilla, Ramiro
core
Abstract Accurate observations of maritime low clouds are important for air and sea transportation, understanding boundary layer processes, and measuring Earth's radiation budget. The nighttime maritime low cloud extent is often determined in meteorological satellite imagery using the brightness‐temperature difference between the longwave infrared (e.g.
Jesse D. Turner +6 more
wiley +1 more source
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core

