Results 1 to 10 of about 75,175 (203)

The relevance of introducing the basics of cryptography and the basics of information security in the school course in computer science

open access: diamondManagement of Education, 2023
Актуальность данной темы обусловлена потребностью в специалистах в области информационной безопасности. Внедрение в школьный курс информатики основ криптографии может значительно повлиять на выбор профессии и качество специалистов в области защиты информации.
А.С. Зуфарова   +2 more
openaire   +3 more sources

Solving discrete logarithms on a 170-bit MNT curve by pairing reduction [PDF]

open access: yes, 2016
Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic.
A Commeine   +33 more
core   +5 more sources

Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone [PDF]

open access: yes, 2017
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe.
Hasibuan, A. M. (Amir)
core   +2 more sources

Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible [PDF]

open access: yes, 1997
There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can ...
Ardehali   +28 more
core   +2 more sources

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens [PDF]

open access: yes, 2015
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in ...
Dowsley, Rafael   +2 more
core   +2 more sources

Encryption’s Importance to Economic and Infrastructure Security [PDF]

open access: yes, 1999
Det övergripande syftet med den här avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka värdeskapandet inom hälso- och sjukvården.
McNulty, F. Lynn
core   +2 more sources

Home - About - Disclaimer - Privacy