Results 121 to 130 of about 23,331 (249)

Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection

open access: yesJournal of Mathematical Cryptology
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj   +1 more source

Quantum Cryptographic Primitives

open access: yes
The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.
openaire   +2 more sources

The Security of Cryptographic Primitives [PDF]

open access: green, 1995
Serge Vaudenay, Jacques Stern
openalex  

Home - About - Disclaimer - Privacy