نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

Journal: :Pattern Analysis and Applications 2021

Abstract The concept of black-and-white visual cryptography with two truly random shares, previously applied to color images, was improved by mixing the contents segments each coding image and randomly changing a specified number black pixels into ones. This done in such way that changes decoded were as small possible. These modifications made numbers shares close balanced, which potentially it...

Journal: :IEEE Access 2023

It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) low-cost approach compared to others key distribution, National Institute Standards Technology (NIST) has recently reviewed analyzed numerous approaches PQC. PQC candidate, Bit Flipping Key Encapsulation (BIKE) expected be stan...

Journal: :Intelligent Automation and Soft Computing 2022

Industrial Internet of Things (IIoT) and Industry 4.0/5.0 offer several interconnections between machinery, equipment, processes, personnel in diverse application areas namely logistics, supply chain, manufacturing, transportation, healthcare. The conventional security-based solutions IIoT environment get degraded due to the third parties. Therefore, recent blockchain technology (BCT) can be em...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2023

Lattice-based cryptography has laid the foundation of various modern-day cryptosystems that cater to several applications, including post-quantum cryptography. For structured lattice-based schemes, polynomial arithmetic is a fundamental part. In instances, performance optimizations come from implementing compact multipliers due small range secret coefficients. However, this optimization does no...

Journal: :Lecture Notes in Computer Science 2021

The threat of quantum computers has sparked the development a new kind cryptography to resist their attacks. Isogenies between elliptic curves are one tools used for such cryptosystems. They championed by SIKE (Supersingular isogeny key encapsulation), an alternate candidate third round NIST Post-Quantum Cryptography Standardization Process. While all candidates believed be mathematically secur...

2001
Rob Hyndman

For example, it has long been recognized that single exponential forecasting (SES) is equivalent to an ARIMA(0,1,1) model (e.g., Harvey, 1989) The additional flexibility of ARIMA models may be thought to lead to more accurate empirical forecasts. However, Table 13 of Makridakis and Hibon shows that there is virtually no improvement in forecasting accuracy using ARIMA models (labeled B-J automat...

2014
Alberto Bucci Philip Ushchev

We explore the nature of sharing externalities in a non-CES model of monopolistic competition with a di erentiated intermediate good. We nd that, in addition to the e ect that an increase in the number of available varieties of intermediate inputs may have on the total factor productivity of the nal good sector (specialization/complexity e ect), another important e ect comes to play a prominent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید