Results 111 to 120 of about 35,343 (264)
CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks
The CommTLC scheme is secure against Fakey, Griefing and Wormhole attacks, as proven using the universal composability framework. It detects adversaries in these attacks within 112 ms for a payment path involving five users. Additionally, it outperforms recent privacy‐preserving PCN‐based solutions, MAPPCN‐OR and EAMHL+, in terms of communication and ...
Prerna Arote, Joy Kuri
wiley +1 more source
A cookie contains a session ID that is a unique number generated by the server. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent (GE) on the application specific integrated circuit (ASIC) for its execution.
Kavita Bhatia+3 more
wiley +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Carmen Camara+3 more
doaj +1 more source
Verifiable Random Functions (VRFs) [PDF]
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon+3 more
core
Application of JXTA-overlay platform for secure robot control [PDF]
In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform.
Arnedo Moreno, Joan+5 more
core +1 more source
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François+3 more
core +1 more source
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network.
Dawei Li+3 more
doaj +1 more source
Quantum Security of Cryptographic Primitives
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire +2 more sources
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The
A. Beletsky, D. Stecenko
doaj