Articles with "theoretic analysis" as a keyword



Photo by lucabravo from unsplash

Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3226907

Abstract: Several cryptosystems based on the Ring Learning with Errors (RLWE) problem have been proposed within the NIST post-quantum cryptography standardization process, e.g., NewHope. Furthermore, there are systems like Kyber which are based on the closely… read more here.

Keywords: mlwe; channel; coding theoretic; theoretic analysis ... See more keywords
Photo from wikipedia

A Game-Theoretic Analysis for Distributed Honeypots

Sign Up to like & get
recommendations!
Published in 2019 at "Future Internet"

DOI: 10.3390/fi11030065

Abstract: A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value.… read more here.

Keywords: system; distributed honeypots; game theoretic; theoretic analysis ... See more keywords