Results 41 to 50 of about 2,794 (176)

A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]

open access: yes, 2016
International ...
A Ferraguti   +37 more
core   +5 more sources

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Towards a Ring Analogue of the Leftover Hash Lemma

open access: yesJournal of Mathematical Cryptology, 2020
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana   +3 more
doaj   +1 more source

Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning

open access: yesEngineering Proceedings
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen   +5 more
doaj   +1 more source

Additively homomorphic ring-LWE masking [PDF]

open access: yes, 2016
In this paper, we present a new masking scheme for ring LWE decryption. Our scheme exploits the additively-homomorphic property of the existing ring-LWE encryption schemes and computes an additive-mask as an encryption of a random message.
de Clercq, Ruan   +4 more
core   +1 more source

Does a Small Country Have Meaningful Regional Personality Differences? The Case of Estonia

open access: yesJournal of Personality, Volume 94, Issue 1, Page 13-28, February 2026.
ABSTRACT Background Regional differences in the Big Five personality domains have been observed in several countries at different geographical granularities, often correlating with regional political, economic, social, and health (PESH) indicators.
Ling Xu   +6 more
wiley   +1 more source

Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography

open access: yesIEEE Access
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

A Lightweight McEliece Cryptosystem Co-processor Design [PDF]

open access: yes, 2019
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +1 more source

An efficient full dynamic group signature scheme over ring

open access: yesCybersecurity, 2019
The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group.
Yiru Sun, Yanyan Liu, Bo Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy