Search
Search Results
-
-
Post-quantum blind signcryption scheme from lattice
Blind signcryption (BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous...
-
Lattice-Based Adaptation Model for Develo** Adaptive Learning Games
Adaptive learning applications that provide personalization of the learning process are one of the fastest growing types of educational software. The... -
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures
Lattice gadgets and the associated algorithms are the essential building blocks of lattice-based cryptography. In the past decade, they have been... -
Multi-adjoint Lattice Logic. Properties and Query Answering
Multi-adjoint lattice logic (MLL) has been introduced as an axiomatization of multi-adjoint algebras on lattices. This paper highlights the interest... -
Sharper bounds on four lattice constants
The Korkine–Zolotareff (KZ) reduction and its generalisations, are widely used lattice reduction strategies in communications and cryptography. The...
-
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled map lattice (NMLNCML) system and DNA operations...
-
A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice
An image encryption model is presented in this paper. The model uses two-dimensional Brownian Motion as a source of confusion and diffusion in image...
-
Image encryption algorithm based on lattice hash function and privacy protection
To solve the problem of lack of trust in cloud platforms, we propose an image encryption algorithm based on the Lattice Hash function and privacy...
-
Labelled Calculi for Lattice-Based Modal Logics
We introduce labelled sequent calculi for the basic normal non-distri-butive modal logic... -
Quantum-safe cryptography: crossroads of coding theory and cryptography
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...
-
Lattice-based autonomous path proxy re-encryption in the standard model
Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the...
-
Lattice Signature with Efficient Protocols, Application to Anonymous Credentials
Digital signature is an essential primitive in cryptography, which can be used as the digital analogue of handwritten signatures but also as a... -
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature
In the resource-constrained environment such as the Internet of Things, the windowed Non-Adjacent-Form (wNAF) representation is usually used to... -
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
Proof of Work (PoW) protocols, originally proposed to circumvent DoS and email spam attacks, are now at the heart of the majority of recent... -
Language Theory and Semantics
This chapter discusses language theory and includes a discussion on the syntax of languages including grammars, parse trees, and derivations from... -
Encoding Non-global Time Representations into the Lattice of Divisibility
In this paper we provide an embedding of finite lattices into $$(\mathbb N,... -
Data Analysis and Interpretation: Methods of Computer-Aided Measuring Transducer Theory, Morphological Analysis, Possibility Theory, and Subjective Mathematical Modeling
AbstractThis article provides an overview of the fundamental research directions being pursued at the Faculty of Physics of Lomonosov Moscow State...
-
A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography
Lattice-based cryptography is one of the most competitive algorithms in post-quantum algorithms. The discrete Gaussian sampler is a fundamental... -
Categorical Approximation Fixpoint Theory
Approximation fixpoint theory (AFT) is a powerful framework that has been widely used for defining the semantics of non-monotonic formalisms in...