Zobrazeno 1 - 10
of 81
pro vyhledávání: '"Routo Terada"'
Autor:
Thales B. Paiva, Routo Terada
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
BIKE is a code-based key encapsulation mechanism (KEM) that was recently selected as an alternate candidate by the NIST’s standardization process on post-quantum cryptography. This KEM is based on the Niederreiter scheme instantiated with QC-MDPC c
Externí odkaz:
https://doaj.org/article/53c4192275ec4141a0333dc83e6cc0e9
Autor:
Routo TERADA, Reynaldo CACERES VILLENA
Publikováno v:
Repositório Institucional da USP (Biblioteca Digital da Produção Intelectual)
Universidade de São Paulo (USP)
instacron:USP
Universidade de São Paulo (USP)
instacron:USP
A Stacked Ensemble Classifier for an Intrusion Detection System in the Edge of IoT and IIoT Networks
Autor:
Giovanni Aparecido Da Silva Oliveira, Priscila Serra Silva Lima, Fabio Kon, Routo Terada, Daniel MaceDo Batista, Roberto Hirata, Mosab Hamdan
Publikováno v:
2022 IEEE Latin-American Conference on Communications (LATINCOM).
Autor:
Routo Terada, Reynaldo C. Villena
Publikováno v:
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022).
There are cryptographic systems that are secure against attacks by both quantum and classical computers. Some of these cryptographic systems are the Key Encapsulation Mechanisms (KEM) based on Ring-LWE problem. Some Ring-LWE problem-based KEMs includ
Autor:
Elisa Mayumi Nishimura, Routo Terada
Publikováno v:
Biblioteca Digital de Teses e Dissertações da USP
Universidade de São Paulo (USP)
instacron:USP
Universidade de São Paulo (USP)
instacron:USP
não disponível not available
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a9030b0a02909e0ed07898c2fe4b8c3d
https://doi.org/10.11606/d.45.1989.tde-20210729-012154
https://doi.org/10.11606/d.45.1989.tde-20210729-012154
Autor:
Routo Terada, Thales Bandiera Paiva
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
ACNS (2)
In 1989, Shamir presented an efficient identification scheme (IDS) based on the permuted kernel problem (PKP). After 21 years, PKP was generalized by Lampe and Patarin, who were able to build an IDS similar to Shamir’s one, but using the binary fie
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::05ac29fe8fef961435cd7f64f871bbe8
https://doi.org/10.1007/978-3-030-78375-4_16
https://doi.org/10.1007/978-3-030-78375-4_16
Publikováno v:
Anais da XVIII Escola Regional de Redes de Computadores (ERRC 2020).
Scanners de vulnerabilidades web auxiliam na detecção de vulnerabilidades em sistemas web de forma automatizada. Um scanner de vulnerabilidade web é dividido em três módulos: módulo rastreador, módulo atacante e módulo analisador. O módulo r
Autor:
Routo Terada, Thales Bandiera Paiva
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
SAC
The HQC public-key encryption scheme is a promising code-based submission to NIST’s post-quantum cryptography standardization process. The scheme is based on the decisional decoding problem for random quasi-cyclic codes. One problem of the HQC’s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::17e2202357d22c2baba3bc1c2bebce82
https://doi.org/10.1007/978-3-030-38471-5_22
https://doi.org/10.1007/978-3-030-38471-5_22
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030302146
ISC
ISC
To improve the energy efficiency of computing systems, modern CPUs provide registers that give estimates on the power consumption. However, the ability to read the power consumption introduces one class of security concerns called covert channels, wh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2e91981489d7b5f5f358c587207986fc
https://doi.org/10.1007/978-3-030-30215-3_16
https://doi.org/10.1007/978-3-030-30215-3_16