-
3941
An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform
Published 2023-07-01“…To address this issue, we present a new text encryption scheme that uses a combination of elliptic curve cryptography and max-plus algebra-based wavelet transform to provide enhanced security and efficiency. …”
Get full text
Article -
3942
Frequency-insensitive spatiotemporal shaping of single photon in multiuser quantum network
Published 2023-09-01“…Abstract Exploiting the fundamental features of quantum mechanics, an entanglement-based quantum network offers a promising platform for many dramatic applications such as multi-user cryptography. Nevertheless, the implementation of a large-scale quantum network in real-world scenarios remains challenging owing to the multiple scattering events in complex environment, particularly those frequency-sensitive scatterings that disturb quantum correlation both spatially and temporally. …”
Get full text
Article -
3943
The Role of the CFO of an Industrial Company: An Analysis of the Impact of Blockchain Technology
Published 2020-07-01“…The blockchain technology, due to its features of transparency, immutability and cryptography combined with its ability to coordinate data flows of e.g., the Internet of Things (IoT) or Artificial Intelligence (AI), constitutes a suitable instrument for the CFO to meet the requirements of Industry 4.0. …”
Get full text
Article -
3944
Improved Attacks on LowMC with Algebraic Techniques
Published 2023-12-01“…It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature algorithms for NIST post-quantum cryptography standardization. The security of PICNIC is highly related to the difficulty of recovering the secret key of LowMC from a given plaintext/ciphertext pair, which raises new challenges for security evaluation under extremely low data complexity. …”
Get full text
Article -
3945
PerancanganSPesifikasi Keamanan Kontrol Akses pada Aplikasi Layanan Informasi di Lingkungan Instansi Pemerintah
Published 2019-02-01“…The model implements the process of authentication, authorization, audit and information security that implements cryptography techniques. The design of the security specification using Common Criteria for Information Technology Security Evaluation version 3.1 (REV 5). …”
Get full text
Article -
3946
Device-independent characterization of entanglement based on bell nonlocality
Published 2021-01-01“…These quantum correlations have the potential for many quantum processes, including canonical ones: quantum cryptography, quantum teleportation, and dense coding. …”
Get full text
Article -
3947
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
Published 2022-01-01“…We also propose a mutual authentication scheme using biometric information and Elliptic Curve Cryptography (ECC) to provide secure communication between users and platform servers and secure avatar interactions between avatars and avatars. …”
Get full text
Article -
3948
Development of Security Rules and Mechanisms to Protect Data from Assaults
Published 2022-12-01“…Cloud cryptography is the art of converting plain text into an unreadable format, which protects data and prevents the data from being misused by the attacker. …”
Get full text
Article -
3949
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
Published 2022-09-01“…Since Picnic is one of the alternate third-round candidates in NIST post-quantum cryptography standardization process, it has become urgent and important to evaluate the security of LowMC in the Picnic setting. …”
Get full text
Article -
3950
Lightweight Multi-Class Support Vector Machine-Based Medical Diagnosis System with Privacy Preservation
Published 2023-11-01“…Notably, our cryptosystem proves to be more efficient than the Paillier and multi-party computation cryptography methods employed in previous research. Although we focus on a medical application in this paper, our approach can also be used for other applications that need the evaluation of machine learning models in a privacy-preserving way such as electricity theft detection in the smart grid, electric vehicle charging coordination, and vehicular social networks. …”
Get full text
Article -
3951
Review of the book by S. A. Andryushin “Money-credit systems: from sources to cryptocurrencies” (Moscow: Sam Poligrafist LLC, 2019. 452 p.)
Published 2019-12-01“…In the author’s opinion, this can be achieved with the help of digital currencies, smart contracts, the Internet, asymmetric cryptography, mathematical algorithms and consensus algorithms, as well as public or private (closed or limited with user access) blockchain technology with open source. …”
Get full text
Article -
3952
-
3953
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
Published 2022-04-01“…Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. …”
Get full text
Article -
3954
Optimal tests of genuine multipartite nonlocality
Published 2022-01-01“…Due to its near-perfect efficiency, our method may open new possibilities in device-independent quantum cryptography applications where strong nonlocality between all partners is required.…”
Get full text
Article -
3955
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge
Published 2022-01-01“…The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. …”
Get full text
Article -
3956
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Published 2016“…The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. …”
Get full text
Get full text
Article -
3957
Session-based security enhancement of RFID systems for emerging open-loop applications
Published 2016“…In this paper, the security demands of RFID tags in emerging open-loop applications are summarized, and two example protocols for authorization, authentication and key establishment based on symmetric cryptography are presented. The proposed protocols adopt a timed-session-based authorization scheme, and all reader-to-tag operations are authorized by a trusted third party using a newly defined class of timed sessions. …”
Get full text
Get full text
Article -
3958
Local Random Quantum Circuits are Approximate Polynomial-Designs
Published 2016“…We give applications of the results to cryptography, equilibration of closed quantum dynamics, and the generation of topological order. …”
Get full text
Get full text
Article -
3959
Lower Bound on Expected Communication Cost of Quantum Huffman Coding
Published 2017Get full text
Get full text
Article -
3960