Results 71 to 80 of about 302 (149)

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Modification of Frodokem Using Gray and Error-Correcting Codes

open access: yesIEEE Access, 2019
Lattice-based cryptography is one of the most promising schemes for post-quantum cryptography. Among the many lattice-based cryptosystems, FrodoKEM is a well-known key-encapsulation mechanism (KEM) based on (plain) learning with errors (LWE) problems and
Eunsang Lee   +4 more
doaj   +1 more source

Impact of Left Ventricular‐Vascular Interaction on Long‐Term Outcome After Heart Transplantation

open access: yesClinical Transplantation, Volume 39, Issue 5, May 2025.
ABSTRACT Background and aim To compare pressure‐volume (PV) derivative variables between HT patients and healthy controls and to assess their impact on long‐term outcome. Methods In this single‐center retrospective study, HT patients surviving their first post‐HT year with left ventricular ejection fraction (LVEF) ≥50%, absence of allograft ...
Mattia Corianò   +10 more
wiley   +1 more source

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

open access: yesEURASIP Journal on Information Security
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly ...
Lin Yang
doaj   +1 more source

Is there a link between access to broadband and health outcomes?

open access: yesThe American Journal of Economics and Sociology, Volume 84, Issue 2, Page 361-386, March 2025.
Abstract There is significant evidence of the positive effects of broadband expansion on various economic outcomes, including property values and business development, with a growing literature aimed at understanding the effect on health outcomes. We contribute to this later literature exploring the effect of broadband access on underexplored health ...
Vikas Gawai, Steven Deller
wiley   +1 more source

On the Ring-LWE and Polynomial-LWE Problems

open access: yes, 2018
The Ring Learning With Errors problem (\(\mathsf {RLWE}\)) comes in various forms. Vanilla \(\mathsf {RLWE}\) is the decision dual-\(\mathsf {RLWE}\) variant, consisting in distinguishing from uniform a distribution depending on a secret belonging to the dual \(\mathcal {O}_K^{\vee }\) of the ring of integers \(\mathcal {O}_K\) of a specified number ...
Roșca, Miruna   +2 more
openaire   +3 more sources

RLWE-based ciphertext-policy attribute proxy re-encryption

open access: yesTongxin xuebao, 2018
To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute ...
En ZHANG, Yaoyao PEI, Jiao DU
doaj   +2 more sources

Quantum Security of a Compact Multi-Signature

open access: yesCryptography
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj   +1 more source

Klepto for Ring-LWE Encryption [PDF]

open access: yesThe Computer Journal, 2018
Dianyan Xiao, Yang Yu
openaire   +1 more source

Home - About - Disclaimer - Privacy