UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 65
1.
  • A survey of elliptic curves... A survey of elliptic curves for proof systems
    Aranha, Diego F.; El Housni, Youssef; Guillevic, Aurore Designs, codes, and cryptography, 11/2023, Letnik: 91, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Elliptic curves have become key ingredients for instantiating zero-knowledge proofs and more generally proof systems. Recently, there have been many tailored constructions of these curves that aim at ...
Celotno besedilo
2.
  • TinyPBC: Pairings for authe... TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
    Oliveira, Leonardo B.; Aranha, Diego F.; Gouvêa, Conrado P.L. ... Computer communications, 03/2011, Letnik: 34, Številka: 3
    Journal Article
    Recenzirano

    Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and ...
Celotno besedilo

PDF
3.
  • Fog orchestration for the I... Fog orchestration for the Internet of Everything: state-of-the-art and research challenges
    Velasquez, Karima; Abreu, David Perez; Assis, Marcio R. M. ... Journal of internet services and applications, 07/2018, Letnik: 9, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling ...
Celotno besedilo

PDF
4.
  • Lattice-Based Homomorphic E... Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics
    Marandi, Ali; Alves, Pedro Geraldo M R; Aranha, Diego F ... Computer journal, 06/2024, Letnik: 67, Številka: 5
    Journal Article
    Recenzirano

    Abstract Privacy-preserving smart meter data collection and analysis are critical for optimizing smart grid environments without compromising privacy. Using homomorphic encryption techniques, smart ...
Celotno besedilo
5.
  • Optimized implementation of... Optimized implementation of QC‐MDPC code‐based cryptography
    Guimarães, Antonio; Aranha, Diego F.; Borin, Edson Concurrency and computation, 25 September 2019, Letnik: 31, Številka: 18
    Journal Article
    Recenzirano

    Summary This paper presents a new enhanced version of the QcBits key encapsulation mechanism, which is a constant‐time implementation of the Niederreiter cryptosystem using QC‐MDPC codes. In this ...
Celotno besedilo
6.
  • User-centric security analy... User-centric security analysis of MitID: The Danish passwordless digital identity solution
    Kingo, Thomas; Aranha, Diego F. Computers & security, September 2023, 2023-09-00, Letnik: 132
    Journal Article
    Recenzirano
    Odprti dostop

    MitID is the new electronic identification (eID) solution in Denmark. It provides access to many online services, including online banking, insurance, taxes, and health information. In this paper, we ...
Celotno besedilo
7.
  • The Ring-LWE Problem in Lat... The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
    Ortiz, Jheyne N.; de Araujo, Robson R.; Aranha, Diego F. ... Entropy (Basel, Switzerland), 08/2021, Letnik: 23, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by ...
Celotno besedilo

PDF
8.
  • Building secure protocols f... Building secure protocols for extensible distributed coordination through secure extensions
    Junior, Edson Floriano S.; Alchieri, Eduardo; Aranha, Diego F. ... Computers & security, November 2019, 2019-11-00, 20191101, Letnik: 87
    Journal Article
    Recenzirano

    Mechanisms for distributed coordination are used in the development of many distributed systems and, generally, are implemented on top of coordination infrastructures, such as tuple spaces. Although ...
Celotno besedilo
9.
  • Performance of hierarchical... Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference
    Alves, Pedro Geraldo M. R.; Ortiz, Jheyne N.; Aranha, Diego F. Journal of cryptographic engineering, 09/2023, Letnik: 13, Številka: 3
    Journal Article
    Recenzirano

    Recent works challenged the number-theoretic transform (NTT) as the most efficient method for polynomial multiplication in GPU implementations of fully homomorphic encryption schemes such as CKKS and ...
Celotno besedilo
10.
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 65

Nalaganje filtrov