Results 1 to 10 of about 75,175 (203)
Актуальность данной темы обусловлена потребностью в специалистах в области информационной безопасности. Внедрение в школьный курс информатики основ криптографии может значительно повлиять на выбор профессии и качество специалистов в области защиты информации.
А.С. Зуфарова +2 more
openaire +3 more sources
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction [PDF]
Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic.
A Commeine +33 more
core +5 more sources
Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone [PDF]
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe.
Hasibuan, A. M. (Amir)
core +2 more sources
Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible [PDF]
There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can ...
Ardehali +28 more
core +2 more sources
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
Analysis of the Security of BB84 by Model Checking [PDF]
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek +2 more
core +2 more sources
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens [PDF]
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in ...
Dowsley, Rafael +2 more
core +2 more sources
Encryption’s Importance to Economic and Infrastructure Security [PDF]
Det övergripande syftet med den här avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka värdeskapandet inom hälso- och sjukvården.
McNulty, F. Lynn
core +2 more sources

