Results 51 to 60 of about 2,659 (196)
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Single-trace attacks are a considerable threat to implementations of classic public-key schemes, and their implications on newer lattice-based schemes are still not well understood.
Mike Hamburg +7 more
doaj +1 more source
Attacks on the Search-RLWE problem with small errors [PDF]
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and
Chen, Hao +2 more
core +2 more sources
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen +5 more
doaj +1 more source
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B. +2 more
core +2 more sources
Ring-LWE: Enhanced Foundations and Applications
Ring Learning With Errors assumption has become an important building block in many modern cryptographic applications, such as (fully) homomorphic encryption and post-quantum cryptosystems like the recently announced NIST CRYSTALS-Kyber public key encryption scheme.
openaire +2 more sources
ABSTRACT Over the past few decades, the intensification of global warming has brought increased attention to urban thermal dynamics, particularly regarding Land Surface Temperature (LST) and the Urban Surface Heat Island (SUHI) effect. This study conducts a systematic literature review alongside a bibliometric analysis of 123 peer‐reviewed articles ...
David Hidalgo‐García +4 more
wiley +1 more source
Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj +1 more source
Efficient Ring-LWE Encryption on 8-Bit AVR Processors [PDF]
Public-key cryptography based on the “ring-variant” of the Learning with Errors (ring-LWE) problem is both efficient and believed to remain secure in a post-quantum world. In this paper, we introduce a carefully-optimized implementation of a ring-LWE encryption scheme for 8-bit AVR processors like the ATxmega128.
Liu, Zhe +5 more
openaire +3 more sources
Translating cardiovascular ion channel and Ca2+ signalling mechanisms into therapeutic insights
Abstract figure legend This white paper integrates mechanistic discoveries across ion channel biology, Ca2+ signalling and multiscale cardiovascular physiology to highlight new opportunities for accelerating research and guiding next‐generation therapies. Printed with permission from ®Anita Impagliazzo Medical Illustration. [Correction added on 2 March
Silvia Marchianò +18 more
wiley +1 more source
An efficient full dynamic group signature scheme over ring
The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group.
Yiru Sun, Yanyan Liu, Bo Wu
doaj +1 more source

