Analysis of public-key cryptography for wireless sensor networks security
FREE-DOWNLOADF Amin, AH Jahangir… – Proceedings of world …, Abstract—With the widespread growth of applications of Wireless Sensor Networks (WSNs), the need for reliable security mechanisms these networks has increased manifold. Many security solutions have been proposed in the domain of WSN so far. These solutions are usually .
Cryptography from noisy storage
FREE-DOWNLOAD S Wehner, C Schaffner… – Physical review letters, We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; ie, the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of
On lattices, learning with errors, random linear codes, and cryptography
FREE-DOWNLOAD O Regev – Journal of the ACM (JACM), Abstract. Our main result is a reduction from worst-case lattice problems such as GAPSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the “learning from parity with error” problem to higher moduli. It can also be viewed as the […]