Results 51 to 60 of about 1,355 (213)

THE TABULAR OF CRYPTOGRAPHIC PRIMITIVES OF NONLINEAR SUBSTITUTIONS

open access: yesÌнформаційні технології в освіті, 2015
Classic primitives nonlinear substitution is a simple replacing each character encrypted text on a fixed symbol of the same alphabet, actually realizing the transformation one alphabet simple substitution cipher. And as a consequence - the entropy cipher
A. Beletsky
doaj  

Improving Security Using Modified S-Box for AES Cryptographic Primitives [PDF]

open access: diamond, 2021
S. Sudhakar   +4 more
openalex   +1 more source

Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 10, October 2025.
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot   +2 more
wiley   +1 more source

Brain‐Inspired Polymer Dendrite Networks for Morphology‐Dependent Computing Hardware

open access: yesAdvanced Science, Volume 12, Issue 33, September 4, 2025.
Although process variability is often perceived as a drawback in electronics, this work harnesses the stochastic nature of electropolymerization as a powerful ally for computation. The resulting conductive polymer dendrites exhibit unique structure‐property relationships and support in memory computing, paving the way for the development of a new class
Corentin Scholaert   +3 more
wiley   +1 more source

Cryptographic primitives based on cellular transformations [PDF]

open access: yesComputer Science Journal of Moldova, 2003
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj  

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

On some quasigroup cryptographical primitives

open access: yes, 2011
11 ...
Csorgo, Piroska, Shcherbacov, Victor
openaire   +2 more sources

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy