Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3226907
Abstract: Several cryptosystems based on the Ring Learning with Errors (RLWE) problem have been proposed within the NIST post-quantum cryptography standardization process, e.g., NewHope. Furthermore, there are systems like Kyber which are based on the closely…
read more here.
Keywords:
mlwe;
channel;
coding theoretic;
theoretic analysis ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Future Internet"
DOI: 10.3390/fi11030065
Abstract: A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value.…
read more here.
Keywords:
system;
distributed honeypots;
game theoretic;
theoretic analysis ... See more keywords