We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Construction-D lattice from Garcia–Stichtenoth tower code

    Elena Kirshanova, Ekaterina Malygina in Designs, Codes and Cryptography
    Article 10 December 2023
  2. Post-quantum blind signcryption scheme from lattice

    Blind signcryption (BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous...

    Article 29 June 2021
  3. Lattice-Based Adaptation Model for Develo** Adaptive Learning Games

    Adaptive learning applications that provide personalization of the learning process are one of the fastest growing types of educational software. The...
    Olga Shabalina, Alexander Khairov, ... David C. Moffat in Creativity in Intelligent Technologies and Data Science
    Conference paper 2023
  4. Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures

    Lattice gadgets and the associated algorithms are the essential building blocks of lattice-based cryptography. In the past decade, they have been...
    Yang Yu, Huiwen Jia, **aoyun Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  5. Multi-adjoint Lattice Logic. Properties and Query Answering

    Multi-adjoint lattice logic (MLL) has been introduced as an axiomatization of multi-adjoint algebras on lattices. This paper highlights the interest...
    Maria Eugenia Cornejo, Luis Fariñas del Cerro, Jesús Medina in Progress in Artificial Intelligence
    Conference paper 2022
  6. Sharper bounds on four lattice constants

    The Korkine–Zolotareff (KZ) reduction and its generalisations, are widely used lattice reduction strategies in communications and cryptography. The...

    **ming Wen, **ao-Wen Chang in Designs, Codes and Cryptography
    Article 09 May 2022
  7. A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations

    In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled map lattice (NMLNCML) system and DNA operations...

    Yuanyuan Li, **aoqing You, ... Jungang Lou in Frontiers of Information Technology & Electronic Engineering
    Article 01 June 2023
  8. A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice

    An image encryption model is presented in this paper. The model uses two-dimensional Brownian Motion as a source of confusion and diffusion in image...

    Mukesh Rawat, Anil Singh Bafila, ... Sanjeev Singh in Multimedia Tools and Applications
    Article 13 April 2023
  9. Image encryption algorithm based on lattice hash function and privacy protection

    To solve the problem of lack of trust in cloud platforms, we propose an image encryption algorithm based on the Lattice Hash function and privacy...

    Yu Wang, Liquan Chen, ... Tianyu Lu in Multimedia Tools and Applications
    Article 09 March 2022
  10. Labelled Calculi for Lattice-Based Modal Logics

    We introduce labelled sequent calculi for the basic normal non-distri-butive modal logic...
    Ineke van der Berg, Andrea De Domenico, ... Mattia Panettiere in Logic and Its Applications
    Conference paper 2023
  11. Quantum-safe cryptography: crossroads of coding theory and cryptography

    We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...

    Jiabo Wang, Ling Liu, ... Cong Ling in Science China Information Sciences
    Article Open access 21 December 2021
  12. Lattice-based autonomous path proxy re-encryption in the standard model

    Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the...

    Wenli **e, Jian Weng, ... Feixiang Zhao in Science China Information Sciences
    Article 23 May 2023
  13. Lattice Signature with Efficient Protocols, Application to Anonymous Credentials

    Digital signature is an essential primitive in cryptography, which can be used as the digital analogue of handwritten signatures but also as a...
    Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  14. Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature

    In the resource-constrained environment such as the Internet of Things, the windowed Non-Adjacent-Form (wNAF) representation is usually used to...
    Ziqiang Ma, Shuaigang Li, ... Bo Luo in Security and Privacy in Communication Networks
    Conference paper 2023
  15. Lattice-Based Proof-of-Work for Post-Quantum Blockchains

    Proof of Work (PoW) protocols, originally proposed to circumvent DoS and email spam attacks, are now at the heart of the majority of recent...
    Rouzbeh Behnia, Eamonn W. Postlethwaite, ... Attila Altay Yavuz in Data Privacy Management, Cryptocurrencies and Blockchain Technology
    Conference paper 2022
  16. Language Theory and Semantics

    This chapter discusses language theory and includes a discussion on the syntax of languages including grammars, parse trees, and derivations from...
    Chapter 2023
  17. Encoding Non-global Time Representations into the Lattice of Divisibility

    In this paper we provide an embedding of finite lattices into $$(\mathbb N,...
    Francisco José Valverde-Albacete, Carmen Peláez-Moreno, ... Manuel Ojeda-Aciego in Information Processing and Management of Uncertainty in Knowledge-Based Systems
    Conference paper 2022
  18. Data Analysis and Interpretation: Methods of Computer-Aided Measuring Transducer Theory, Morphological Analysis, Possibility Theory, and Subjective Mathematical Modeling

    Abstract

    This article provides an overview of the fundamental research directions being pursued at the Faculty of Physics of Lomonosov Moscow State...

    Yu. P. Pyt’ev, A. I. Chulichkov, ... D. A. Balakin in Pattern Recognition and Image Analysis
    Article 01 December 2023
  19. A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography

    Lattice-based cryptography is one of the most competitive algorithms in post-quantum algorithms. The discrete Gaussian sampler is a fundamental...
    Jiaxin Deng, Simin Chen, ... Weizhi Meng in Emerging Information Security and Applications
    Conference paper 2022
  20. Categorical Approximation Fixpoint Theory

    Approximation fixpoint theory (AFT) is a powerful framework that has been widely used for defining the semantics of non-monotonic formalisms in...
    Angelos Charalambidis, Panos Rondogiannis in Logics in Artificial Intelligence
    Conference paper 2023
Did you find what you were looking for? Share feedback.