Results 101 to 110 of about 375,459 (282)

A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm

open access: yesIEEE Access
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah   +4 more
doaj   +1 more source

On the composable security of weak coin flipping [PDF]

open access: yesQuantum
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu   +3 more
doaj   +1 more source

Application of JXTA-overlay platform for secure robot control [PDF]

open access: yes, 2010
In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform.
Arnedo Moreno, Joan   +5 more
core   +1 more source

Security Amplification for Interactive Cryptographic Primitives [PDF]

open access: yes, 2009
Security amplification is an important problem in Cryptography: starting with a "weakly secure" variant of some cryptographic primitive, the goal is to build a "strongly secure" variant of the same primitive. This question has been successfully studied for a variety of important cryptographic primitives, such as one-way functions, collision-resistant ...
Valentine Kabanets   +3 more
openaire   +2 more sources

Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]

open access: yes, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core   +1 more source

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability

open access: yesNetwork and Distributed System Security Symposium, 2019
—Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permis-sionless blockchain technology. Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability issues ...
Giulio Malavolta   +4 more
semanticscholar   +1 more source

(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy

open access: yesCybersecurity, 2019
Dual receiver encryption (DRE) is an important cryptographic primitive introduced by Diament et al. at CCS’04, which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.
Yanyan Liu, Daode Zhang, Yi Deng, Bao Li
doaj   +1 more source

Revisiting LFSMs

open access: yes, 2010
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François   +3 more
core   +1 more source

Quantum Security of Cryptographic Primitives

open access: yes, 2017
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy