Results 61 to 70 of about 2,659 (196)
Ring-LWE: Applications to Cryptography and Their Efficient Realization [PDF]
The persistent progress of quantum computing with algorithms of Shor and Proos and Zalka has put our present RSA and ECC based public key cryptosystems at peril. There is a flurry of activity in cryptographic research community to replace classical cryptography schemes with their post-quantum counterparts. The learning with errors problem introduced by
Sinha Roy, Sujoy +2 more
openaire +2 more sources
ABSTRACT The demand for protein‐based liquid foods is increasing due to growing awareness of the impact of diet on human health. This trend has prompted the food industry to explore minimal processing technologies that ensure both safety and clean‐label appeal.
Jerish Joyner Janahar +2 more
wiley +1 more source
Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS–Kyber ...
P.S. Renisha, Bhawana Rudra
doaj +1 more source
On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography [PDF]
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised ...
Howe, James +4 more
core +1 more source
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo +5 more
wiley +1 more source
Efficient Security Scheme for Disaster Surveillance UAV Communication Networks
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas.
Asmaa Abdallah +3 more
doaj +1 more source
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
NFLlib: NTT-based Fast Lattice Library [PDF]
International audienceRecent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alternative to classical ...
Aguilar Melchor, Carlos +5 more
core +4 more sources
Sheep or beef cattle (cattle) share of total farm feed consumed, measured in stock units (SU) on New Zealand farms, is often adjusted depending on the profitability of each enterprise. The impact of these adjustments on whole‐farm productivity, profitability and predicted methane (CH4) output has not been recently explored. A system dynamics model of a
Joseph A. Adjabui +5 more
wiley +1 more source
Towards an interpreter for efficient encrypted computation [PDF]
Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs.
Devadas, Srinivas +2 more
core +2 more sources

