Results 41 to 50 of about 375,459 (282)

Statistical assessment – as a part of security assessment applied to a block cipher [PDF]

open access: yesRevista Română de Statistică, 2016
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj  

The Eleventh Power Residue Symbol

open access: yesJournal of Mathematical Cryptology, 2020
This paper presents an efficient algorithm for computing 11th-power residue symbols in the cyclo-tomic field ℚ(ζ11),$ \mathbb{Q}\left( {{\zeta }_{11}} \right), $where 11 is a primitive 11th root of unity.
Joye Marc   +3 more
doaj   +1 more source

Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network

open access: yesnpj Quantum Information, 2022
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang   +14 more
doaj   +1 more source

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar   +4 more
doaj   +1 more source

Compiling symbolic attacks to protocol implementation tests

open access: yes, 2012
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem   +2 more
core   +4 more sources

Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography [PDF]

open access: yes, 2014
We study quantum protocols among two distrustful parties. By adopting a rather strict definition of correctness - guaranteeing that honest players obtain their correct outcomes only - we can show that every strictly correct quantum protocol implementing ...
Salvail, Louis   +2 more
core   +2 more sources

Artificial Intelligence for the Design of Symmetric Cryptographic Primitives

open access: yes, 2022
This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief introduction to the basic concepts underlying the field of cryptography, we review the most researched use cases concerning the use of AI techniques and models to design cryptographic primitives, focusing ...
Mariot, L.   +3 more
openaire   +6 more sources

Breaking universal limitations on quantum conference key agreement without quantum memory

open access: yesCommunications Physics, 2023
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in ...
Chen-Long Li   +7 more
doaj   +1 more source

Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)

open access: yesJournal of Mathematical Cryptology, 2020
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a ...
Crescenzo Giovanni Di   +3 more
doaj   +1 more source

Remarks on the Cryptographic Primitive of Attribute-based Encryption [PDF]

open access: yes, 2014
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption which has no intention to exclude any partners of the intended
Cao, Zhengjun, Liu, Lihua
core   +1 more source

Home - About - Disclaimer - Privacy