Wake-Up Signal Multiplexing with Non-Coherently Detected Waveforms

F Berggren, AG Perotti… - 2024 IEEE 99th Vehicular …, 2024 - ieeexplore.ieee.org
A wake-up signal (WUS) can be transmitted from the base station to the user equipment
(UE) in order to power-on a UE that was put in sleep mode. The UE may have a dedicated …

Generating all invertible matrices by row operations

P Gregor, HP Hoang, A Merino, O Mička - arxiv preprint arxiv:2405.01863, 2024 - arxiv.org
We show that all invertible $ n\times n $ matrices over any finite field $\mathbb {F} _q $ can
be generated in a Gray code fashion. More specifically, there exists a listing such that (1) …

Post-Quantum Cryptography Migration: Challenges in Education

T Fabšič, O Grošek, V Hromada… - Toward a Quantum-Safe …, 2024 - ebooks.iospress.nl
PQC migration represents multiple challenges in education. We will need to educate our
future cryptography researchers and engineers on new topics, introduce new challenges …

Toward a Quantum-Safe Communication Infrastructure 1 R. Steinwandt and A. Xuereb (Eds.) IOS Press, 2024© 2024 IOS Press. All rights reserved.

E BRESSON - Toward a Quantum-Safe Communication …, 2024 - books.google.com
This paper provides an overview of the economic impact of quantum technologies. The goal
is not to be exhaustive but rather to describe an up-to-date panel of stakes, challenges and …

[PDF][PDF] Bachelor's Thesis Computing Science

K Sezer, J Daemen, B Mennink - 2024 - cs.ru.nl
In this paper, we address the vulnerabilities that were discovered in the authenticated
encryption scheme Friet [14]. The authors of [17] demonstrated that the scheme is …

[PDF][PDF] New Method for Designing Binary 8× 8 Matrices With Branch Number 5 Using Quasigroups

V Dimitrova, V Bakeva, Z Trajcheska - personales.upv.es
Quasigroups are algebraic structures, which are useful for application in cryptography and
coding theory. Their specific properties and Boolean representations open a lot of scientific …

Code-based cryptography: A superficial introduction

HG Østerhus - 2018 - bora.uib.no
This thesis provides an overview of some known post-quantum cryptography schemes with
special attention given to code-based schemes. It also discusses some challenges that may …

[PDF][PDF] CONTRIBUTIONS TO THE ANALYSIS OF THE QC-LDPC MCELIECE CRYPTOSYSTEM

MT Fabšic - uim.fei.stuba.sk
In [20], PW Shor demonstrated that prime factorization and discrete logarithms can be solved
in polynomial time on a quantum computer. This means that building a sufficiently large …