Results 51 to 60 of about 384,292 (296)

PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They can be found in critical infrastructures like power grids, water systems, nuclear plants, manufacturing systems, etc.
Zheng Yang   +4 more
doaj   +1 more source

Quantum advantage for probabilistic one-time programs

open access: yesNature Communications, 2018
Information Theoretically-secure deterministic programs that self-destruct after a single use are known to be impossible to implement. Here, the authors use quantum states to implement a probabilistic version of this fundamental cryptographic primitive ...
Marie-Christine Roehsner   +4 more
doaj   +1 more source

Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network

open access: yesnpj Quantum Information, 2022
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang   +14 more
doaj   +1 more source

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar   +4 more
doaj   +1 more source

The Eleventh Power Residue Symbol

open access: yesJournal of Mathematical Cryptology, 2020
This paper presents an efficient algorithm for computing 11th-power residue symbols in the cyclo-tomic field ℚ(ζ11),$ \mathbb{Q}\left( {{\zeta }_{11}} \right), $where 11 is a primitive 11th root of unity.
Joye Marc   +3 more
doaj   +1 more source

Permutable Cut-and-Choose Oblivious Transfer and Its Application

open access: yesIEEE Access, 2020
Oblivious transfer (OT) is a significant primitive with wide use in secure two-party computation, private set intersection private and other cryptographic schemes.
Xiaochao Wei   +3 more
doaj   +1 more source

A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map [PDF]

open access: yesPeerJ Computer Science, 2022
Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key.
Asim Ali   +3 more
doaj   +2 more sources

Statistical assessment – as a part of security assessment applied to a block cipher [PDF]

open access: yesRevista Română de Statistică, 2016
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj  

HACL*: A Verified Modern Cryptographic Library

open access: yesConference on Computer and Communications Security, 2017
HACL* is a verified portable C cryptographic library that implements modern cryptographic primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC message authentication, SHA-256 and SHA-512 hash functions, the Curve25519 ...
J. Zinzindohoué   +3 more
semanticscholar   +1 more source

Breaking universal limitations on quantum conference key agreement without quantum memory

open access: yesCommunications Physics, 2023
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in ...
Chen-Long Li   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy