The proliferation of Internet of Things (IoT) devices in cloud-assisted environments raises urgent concerns regarding fine-grained access control, policy privacy, and resilience against quantum adversaries.
Potchakorn Poomekum +2 more
doaj +1 more source
A structured review of lattice based attribute based encryption methods for post quantum security
The rapid advancement of quantum computing threatens to undermine classical cryptographic primitives, creating an urgent need for post-quantum secure alternatives.
Saima Hasib +4 more
doaj +1 more source
A Central Limit Approach for Ring-LWE Noise Analysis
This paper develops Central Limit arguments for analysing the noise in ciphertexts in two homomorphic encryption schemes that are based on Ring-LWE. The first main contribution of this paper is to present and evaluate an average-case noise analysis for the BGV scheme.
Sean Murphy, Rachel Player
openaire +1 more source
Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation. [PDF]
Chang Y, Yan Y, Zhu C, Guo P.
europepmc +1 more source
Categorical framework for quantum-resistant zero-trust AI security. [PDF]
Cherkaoui I, Clarke C, Horgan J, Dey I.
europepmc +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks. [PDF]
Alrashdi R +7 more
europepmc +1 more source
Practical NTRU Signcryption in the Standard Model. [PDF]
Yan J +5 more
europepmc +1 more source
Lightweight Hardware Implementation of Binary Ring-LWE PQC Accelerator
Benjamin J. Lucas +9 more
openaire +1 more source

