Articles with "based cryptography" as a keyword



Photo by rynocerontem from unsplash

Multiple-Valued Logic and Neural Network in the Position-Based Cryptography Scheme

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Russian Laser Research"

DOI: 10.1007/s10946-021-10000-7

Abstract: Position-based cryptography schemes for network mobile robots assume the integration of quantum technologies and artificial intelligence methods of neural networks and multi-agent systems. The design of such schemes can be simplified by means of multiple-valued… read more here.

Keywords: multiple valued; based cryptography; network; position based ... See more keywords
Photo from academic.microsoft.com

A reliable chaos-based cryptography using Galois field.

Sign Up to like & get
recommendations!
Published in 2021 at "Chaos"

DOI: 10.1063/5.0061639

Abstract: Chaos-based image encryption schemes have been extensively employed over the past few years. Many issues such as the dynamical degradation of digital chaotic systems and information security have been explored, and plenty of successful solutions… read more here.

Keywords: based cryptography; chaos based; reliable chaos; galois field ... See more keywords
Photo by joakimnadell from unsplash

Configurable Mixed-Radix Number Theoretic Transform Architecture for Lattice-Based Cryptography

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3145988

Abstract: Lattice-based cryptography continues to dominate in the second-round finalists of the National Institute of Standards and Technology post-quantum cryptography standardization process. Computational efficiency is primarily considered to evaluate promising candidates for final round selection. In… read more here.

Keywords: based cryptography; lattice based; architecture; number theoretic ... See more keywords
Photo from wikipedia

AC-PM: An Area-Efficient and Configurable Polynomial Multiplier for Lattice Based Cryptography

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2022.3218192

Abstract: As the computation bottleneck in lattice-based cryptography (LBC), the polynomial multiplication based on number theoretic transform (NTT) has been continuously studied for flexible hardware implementations with high area-efficiency. This paper presents an area-efficient and configurable… read more here.

Keywords: area efficient; area; based cryptography; efficient configurable ... See more keywords
Photo from wikipedia

Area-Time-Efficient Scalable Schoolbook Polynomial Multiplier for Lattice-Based Cryptography

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2022.3188943

Abstract: Lattice-based cryptography (LBC) stands out as one of the most viable classes of quantum-resistant schemes. This brief explores a time-sharing approach, with different parallelism levels, for a crucial operation in LBC cryptosystems, i.e., polynomial multiplication.… read more here.

Keywords: time; schoolbook polynomial; area time; area ... See more keywords