Results 51 to 60 of about 2,659 (196)

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Single-trace attacks are a considerable threat to implementations of classic public-key schemes, and their implications on newer lattice-based schemes are still not well understood.
Mike Hamburg   +7 more
doaj   +1 more source

Attacks on the Search-RLWE problem with small errors [PDF]

open access: yes, 2017
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and
Chen, Hao   +2 more
core   +2 more sources

Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning

open access: yesEngineering Proceedings
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen   +5 more
doaj   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Ring-LWE: Enhanced Foundations and Applications

open access: yes, 2022
Ring Learning With Errors assumption has become an important building block in many modern cryptographic applications, such as (fully) homomorphic encryption and post-quantum cryptosystems like the recently announced NIST CRYSTALS-Kyber public key encryption scheme.
openaire   +2 more sources

Urban Heat and Spatial Statistics, Toward Sustainable Cities and Society: A PRISMA‐Based Systematic Review and Empirical Assessment (2020–2025)

open access: yesSustainable Development, EarlyView.
ABSTRACT Over the past few decades, the intensification of global warming has brought increased attention to urban thermal dynamics, particularly regarding Land Surface Temperature (LST) and the Urban Surface Heat Island (SUHI) effect. This study conducts a systematic literature review alongside a bibliometric analysis of 123 peer‐reviewed articles ...
David Hidalgo‐García   +4 more
wiley   +1 more source

Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography

open access: yesIEEE Access
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj   +1 more source

Efficient Ring-LWE Encryption on 8-Bit AVR Processors [PDF]

open access: yes, 2015
Public-key cryptography based on the “ring-variant” of the Learning with Errors (ring-LWE) problem is both efficient and believed to remain secure in a post-quantum world. In this paper, we introduce a carefully-optimized implementation of a ring-LWE encryption scheme for 8-bit AVR processors like the ATxmega128.
Liu, Zhe   +5 more
openaire   +3 more sources

Translating cardiovascular ion channel and Ca2+ signalling mechanisms into therapeutic insights

open access: yesThe Journal of Physiology, EarlyView.
Abstract figure legend This white paper integrates mechanistic discoveries across ion channel biology, Ca2+ signalling and multiscale cardiovascular physiology to highlight new opportunities for accelerating research and guiding next‐generation therapies. Printed with permission from ®Anita Impagliazzo Medical Illustration. [Correction added on 2 March
Silvia Marchianò   +18 more
wiley   +1 more source

An efficient full dynamic group signature scheme over ring

open access: yesCybersecurity, 2019
The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group.
Yiru Sun, Yanyan Liu, Bo Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy