Results 41 to 50 of about 367,345 (251)

Automatically eliminating speculative leaks from cryptographic code with blade

open access: yesProc. ACM Program. Lang., 2020
We introduce Blade, a new approach to automatically and efficiently eliminate speculative leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative execution, it suffices to cut the dataflow from expressions that ...
Marco Vassena   +7 more
semanticscholar   +1 more source

Optimization of Additive Fibonacci Generators Based on Primitive Polynomials Over GF(p)

open access: yesIEEE Access
This paper presents an approach to the modification of the additive Fibonacci generator by implementing it based on primitive polynomials over the field GF(p).
Pawel Sawicki   +7 more
doaj   +1 more source

Breaking universal limitations on quantum conference key agreement without quantum memory

open access: yesCommunications Physics, 2023
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in ...
Chen-Long Li   +7 more
doaj   +1 more source

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 1, January 2026.
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley   +1 more source

Variable Bit Permutations: Linear Characteristics and Pure VBP-Based Cipher [PDF]

open access: yesComputer Science Journal of Moldova, 2005
This paper describes linear characteristics of the variable bit permutations (VBP) that are used in the form of the data-dependent permutations. This primitive suites well to the design of fast cheap-hardware-oriented ciphers. Because of the existence of
N.A. Moldovyan   +2 more
doaj  

Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)

open access: yesJournal of Mathematical Cryptology, 2020
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a ...
Crescenzo Giovanni Di   +3 more
doaj   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In smart grid, smart meters are deployed to collect power consumption data periodically, and the data are analyzed to improve the efficiency of power transmission and distribution.
Wei Ren, Liangli Ma, Yi Ren
doaj   +1 more source

Threshold schemes for cryptographic primitives:

open access: gold, 2019
Luís T. A. N. Brandão   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy