Results 101 to 110 of about 375,459 (282)
A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah+4 more
doaj +1 more source
On the composable security of weak coin flipping [PDF]
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu+3 more
doaj +1 more source
Application of JXTA-overlay platform for secure robot control [PDF]
In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform.
Arnedo Moreno, Joan+5 more
core +1 more source
Security Amplification for Interactive Cryptographic Primitives [PDF]
Security amplification is an important problem in Cryptography: starting with a "weakly secure" variant of some cryptographic primitive, the goal is to build a "strongly secure" variant of the same primitive. This question has been successfully studied for a variety of important cryptographic primitives, such as one-way functions, collision-resistant ...
Valentine Kabanets+3 more
openaire +2 more sources
Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core +1 more source
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
—Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permis-sionless blockchain technology. Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability issues ...
Giulio Malavolta+4 more
semanticscholar +1 more source
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers [PDF]
Sajjad Shaukat Jamal+3 more
openalex +1 more source
Dual receiver encryption (DRE) is an important cryptographic primitive introduced by Diament et al. at CCS’04, which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.
Yanyan Liu, Daode Zhang, Yi Deng, Bao Li
doaj +1 more source
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François+3 more
core +1 more source
Quantum Security of Cryptographic Primitives
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire +2 more sources