Results 41 to 50 of about 23,331 (249)

Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network

open access: yesnpj Quantum Information, 2022
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang   +14 more
doaj   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

A Security Framework for JXTA-Overlay [PDF]

open access: yes, 2009
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan   +3 more
core   +3 more sources

Quantum Security of Cryptographic Primitives

open access: yesCoRR, 2017
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire   +4 more sources

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They can be found in critical infrastructures like power grids, water systems, nuclear plants, manufacturing systems, etc.
Zheng Yang   +4 more
doaj   +1 more source

On the group generated by the round functions of translation based ciphers over arbitrary finite fields

open access: yes, 2013
We define a translation based cipher over an arbitrary finite field, and study the permutation group generated by the round functions of such a cipher. We show that under certain cryptographic assumptions this group is primitive.
Aragona, R.   +3 more
core   +1 more source

The chaining lemma and its application [PDF]

open access: yes, 2014
We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called “chain” of random variables, defined by a source distribution X(0)with high min-entropy and a number (say, t in total) of arbitrary functions (T1 ...
D. Boneh   +22 more
core   +2 more sources

Home - About - Disclaimer - Privacy