Results 51 to 60 of about 2,794 (176)
On the ideal shortest vector problem over random rational primes [PDF]
Any ideal in a number field can be factored into a product of prime ideals. In this paper we study the prime ideal shortest vector problem (SVP) in the ring $ \Z[x]/(x^{2^n} + 1) $, a popular choice in the design of ideal lattice based cryptosystems.
Cheng, Qi +3 more
core +1 more source
Morphology and function of pinniped necks: The long and short of it
Abstract Terrestrial vertebrates from at least 30 distinct lineages in both extinct and extant clades have returned to aquatic environments. With these transitions came numerous morphological adaptations to accommodate life in water. Relatively little attention has been paid to the cervical region when tracking this transition.
Justin Keller +3 more
wiley +1 more source
Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS–Kyber ...
P.S. Renisha, Bhawana Rudra
doaj +1 more source
Abstract In 2023, atmospheric methane (CH4) saw a decrease in the annual growth rate following record increases from 2020 to 2022. Recent changes in CH4 remain difficult to quantify due to delays in near‐real‐time (NRT) carbon cycle estimates. However, NRT models and subseasonal‐to‐seasonal (S2S) forecasting can provide the opportunity to analyze ...
Colin A. Quinn +7 more
wiley +1 more source
Efficient Security Scheme for Disaster Surveillance UAV Communication Networks
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas.
Asmaa Abdallah +3 more
doaj +1 more source
Improved Reduction Between SIS Problems Over Structured Lattices
Many lattice-based cryptographic schemes are constructed based on hard problems on an algebraic structured lattice, such as the short integer solution (SIS) problems.
Zahyun Koo +4 more
doaj +1 more source
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
NFLlib: NTT-based Fast Lattice Library [PDF]
International audienceRecent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alternative to classical ...
Aguilar Melchor, Carlos +5 more
core +4 more sources
Secondary forests are crucial for achieving COP15/16 conservation goals. An operational national approach was developed to identify and characterise forest ecosystems based on the dominant tree species in the canopy, serving as indicators for ecosystem extent and condition.
Maïri Souza Oliveira +13 more
wiley +1 more source
On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography [PDF]
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised ...
Howe, James +4 more
core +1 more source

