Showing 3,941 - 3,960 results of 4,079 for search '"cryptography"', query time: 0.10s Refine Results
  1. 3941

    An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform by Kanza Abdul Sattar, Takreem Haider, Umar Hayat, Miguel D. Bustamante

    Published 2023-07-01
    “…To address this issue, we present a new text encryption scheme that uses a combination of elliptic curve cryptography and max-plus algebra-based wavelet transform to provide enhanced security and efficiency. …”
    Get full text
    Article
  2. 3942

    Frequency-insensitive spatiotemporal shaping of single photon in multiuser quantum network by Yiwen Huang, Zhantong Qi, Yilin Yang, Yuanhua Li, Yiwei Sun, Yongzhi Tang, Fengchao Ni, Lanting Li, Yuanlin Zheng, Xianfeng Chen

    Published 2023-09-01
    “…Abstract Exploiting the fundamental features of quantum mechanics, an entanglement-based quantum network offers a promising platform for many dramatic applications such as multi-user cryptography. Nevertheless, the implementation of a large-scale quantum network in real-world scenarios remains challenging owing to the multiple scattering events in complex environment, particularly those frequency-sensitive scatterings that disturb quantum correlation both spatially and temporally. …”
    Get full text
    Article
  3. 3943

    The Role of the CFO of an Industrial Company: An Analysis of the Impact of Blockchain Technology by Philipp Sandner, Anna Lange, Philipp Schulden

    Published 2020-07-01
    “…The blockchain technology, due to its features of transparency, immutability and cryptography combined with its ability to coordinate data flows of e.g., the Internet of Things (IoT) or Artificial Intelligence (AI), constitutes a suitable instrument for the CFO to meet the requirements of Industry 4.0. …”
    Get full text
    Article
  4. 3944

    Improved Attacks on LowMC with Algebraic Techniques by Yimeng Sun, Jiamin Cui, Meiqin Wang

    Published 2023-12-01
    “…It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature algorithms for NIST post-quantum cryptography standardization. The security of PICNIC is highly related to the difficulty of recovering the secret key of LowMC from a given plaintext/ciphertext pair, which raises new challenges for security evaluation under extremely low data complexity. …”
    Get full text
    Article
  5. 3945

    PerancanganSPesifikasi Keamanan Kontrol Akses pada Aplikasi Layanan Informasi di Lingkungan Instansi Pemerintah by Esti Rahmawati Agustina, Faizal Achmad

    Published 2019-02-01
    “…The model implements the process of authentication, authorization, audit and information security that implements cryptography techniques. The design of the security specification using Common Criteria for Information Technology Security Evaluation version 3.1 (REV 5). …”
    Get full text
    Article
  6. 3946

    Device-independent characterization of entanglement based on bell nonlocality by Geng Chen, Wen-Hao Zhang, Peng Yin, Chuan-Feng Li, Guang-Can Guo

    Published 2021-01-01
    “…These quantum correlations have the potential for many quantum processes, including canonical ones: quantum cryptography, quantum teleportation, and dense coding. …”
    Get full text
    Article
  7. 3947

    Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain by Jongseok Ryu, Seunghwan Son, Joonyoung Lee, Yohan Park, Youngho Park

    Published 2022-01-01
    “…We also propose a mutual authentication scheme using biometric information and Elliptic Curve Cryptography (ECC) to provide secure communication between users and platform servers and secure avatar interactions between avatars and avatars. …”
    Get full text
    Article
  8. 3948

    Development of Security Rules and Mechanisms to Protect Data from Assaults by Syeda Wajiha Zahra, Ali Arshad, Muhammad Nadeem, Saman Riaz, Ashit Kumar Dutta, Zaid Alzaid, Rana Alabdan, Badr Almutairi, Sultan Almotairi

    Published 2022-12-01
    “…Cloud cryptography is the art of converting plain text into an unreadable format, which protects data and prevents the data from being misused by the attacker. …”
    Get full text
    Article
  9. 3949

    New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting by Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe

    Published 2022-09-01
    “…Since Picnic is one of the alternate third-round candidates in NIST post-quantum cryptography standardization process, it has become urgent and important to evaluate the security of LowMC in the Picnic setting. …”
    Get full text
    Article
  10. 3950

    Lightweight Multi-Class Support Vector Machine-Based Medical Diagnosis System with Privacy Preservation by Sherif Abdelfattah, Mohamed Baza, Mohamed Mahmoud, Mostafa M. Fouda, Khalid Abualsaud, Elias Yaacoub, Maazen Alsabaan, Mohsen Guizani

    Published 2023-11-01
    “…Notably, our cryptosystem proves to be more efficient than the Paillier and multi-party computation cryptography methods employed in previous research. Although we focus on a medical application in this paper, our approach can also be used for other applications that need the evaluation of machine learning models in a privacy-preserving way such as electricity theft detection in the smart grid, electric vehicle charging coordination, and vehicular social networks. …”
    Get full text
    Article
  11. 3951

    Review of the book by S. A. Andryushin “Money-credit systems: from sources to cryptocurrencies” (Moscow: Sam Poligrafist LLC, 2019. 452 p.) by R. A. Grigoryev

    Published 2019-12-01
    “…In the author’s opinion, this can be achieved with the help of digital currencies, smart contracts, the Internet, asymmetric cryptography, mathematical algorithms and consensus algorithms, as well as public or private (closed or limited with user access) blockchain technology with open source. …”
    Get full text
    Article
  12. 3952
  13. 3953

    An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy by Alan Torres-Alvarado, Luis Alberto Morales-Rosales, Ignacio Algredo-Badillo, Francisco López-Huerta, Mariana Lobato-Báez, Juan Carlos López-Pimentel

    Published 2022-04-01
    “…Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. …”
    Get full text
    Article
  14. 3954

    Optimal tests of genuine multipartite nonlocality by Mahasweta Pandit, Artur Barasiński, István Márton, Tamás Vértesi, Wiesław Laskowski

    Published 2022-01-01
    “…Due to its near-perfect efficiency, our method may open new possibilities in device-independent quantum cryptography applications where strong nonlocality between all partners is required.…”
    Get full text
    Article
  15. 3955

    Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge by Mayuresh Sunil Pardeshi, Ruey-Kai Sheu, Shyan-Ming Yuan

    Published 2022-01-01
    “…The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. …”
    Get full text
    Article
  16. 3956

    On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation by Bitansky, Nir, Paneth, Omer

    Published 2016
    “…The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. …”
    Get full text
    Get full text
    Article
  17. 3957

    Session-based security enhancement of RFID systems for emerging open-loop applications by Wang, Junyu, Floerkemeier, Christian, Sarma, Sanjay Emani

    Published 2016
    “…In this paper, the security demands of RFID tags in emerging open-loop applications are summarized, and two example protocols for authorization, authentication and key establishment based on symmetric cryptography are presented. The proposed protocols adopt a timed-session-based authorization scheme, and all reader-to-tag operations are authorized by a trusted third party using a newly defined class of timed sessions. …”
    Get full text
    Get full text
    Article
  18. 3958

    Local Random Quantum Circuits are Approximate Polynomial-Designs by Horodecki, Michał, Brandão, Fernando G. S. L., Harrow, Aram W

    Published 2016
    “…We give applications of the results to cryptography, equilibration of closed quantum dynamics, and the generation of topological order. …”
    Get full text
    Get full text
    Article
  19. 3959
  20. 3960