Results 61 to 70 of about 2,659 (196)

Ring-LWE: Applications to Cryptography and Their Efficient Realization [PDF]

open access: yes, 2016
The persistent progress of quantum computing with algorithms of Shor and Proos and Zalka has put our present RSA and ECC based public key cryptosystems at peril. There is a flurry of activity in cryptographic research community to replace classical cryptography schemes with their post-quantum counterparts. The learning with errors problem introduced by
Sinha Roy, Sujoy   +2 more
openaire   +2 more sources

Innovative Processing Technologies for Clean‐Label Liquid Foods With High Protein Content: Advances in Process Development and Quality Evaluation

open access: yesComprehensive Reviews in Food Science and Food Safety, Volume 25, Issue 3, May 2026.
ABSTRACT The demand for protein‐based liquid foods is increasing due to growing awareness of the impact of diet on human health. This trend has prompted the food industry to explore minimal processing technologies that ensure both safety and clean‐label appeal.
Jerish Joyner Janahar   +2 more
wiley   +1 more source

Quantum-Safe Threshold Cryptography for Decentralized Group Key Management via Dealerless DKG (CRYSTALS–Kyber)

open access: yesMathematics
Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS–Kyber ...
P.S. Renisha, Bhawana Rudra
doaj   +1 more source

On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography [PDF]

open access: yes, 2016
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised ...
Howe, James   +4 more
core   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Efficient Security Scheme for Disaster Surveillance UAV Communication Networks

open access: yesInformation, 2019
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas.
Asmaa Abdallah   +3 more
doaj   +1 more source

When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

open access: yes, 2017
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed   +2 more
core   +1 more source

NFLlib: NTT-based Fast Lattice Library [PDF]

open access: yes, 2016
International audienceRecent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alternative to classical ...
Aguilar Melchor, Carlos   +5 more
core   +4 more sources

The Effect of Alternative Sheep–Beef Enterprise Mixes on Farm Productivity, Profitability and Predicted Enteric Methane Emissions in North Island Hill Country Farms

open access: yesNew Zealand Journal of Agricultural Research, Volume 69, Issue 2, April 2026.
Sheep or beef cattle (cattle) share of total farm feed consumed, measured in stock units (SU) on New Zealand farms, is often adjusted depending on the profitability of each enterprise. The impact of these adjustments on whole‐farm productivity, profitability and predicted methane (CH4) output has not been recently explored. A system dynamics model of a
Joseph A. Adjabui   +5 more
wiley   +1 more source

Towards an interpreter for efficient encrypted computation [PDF]

open access: yes, 2012
Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs.
Devadas, Srinivas   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy