Results 61 to 70 of about 21,314 (180)

High-level Cryptographic Abstractions

open access: yes, 2019
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham   +4 more
core   +1 more source

Singapore upon the Korea Strait? Cyberlibertarian Desires and Anxious Regulation in Busan's Blockchain Regulation Free Zone

open access: yesAntipode, Volume 57, Issue 5, Page 1892-1913, September 2025.
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley   +1 more source

Quantum Computing: Foundations, Architecture and Applications

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
This paper presents a study on quantum computing's theoretical foundations and applications, illustrated by a quantum circuit diagram featuring gates and measurements that demonstrate qubit manipulation and entanglement. ABSTRACT Quantum computing exploits the principles of quantum mechanics to address computational problems that are intractable to ...
Christopher Columbus Chinnappan   +4 more
wiley   +1 more source

Oblivious Transfer based on Key Exchange

open access: yes, 2007
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh   +3 more
core   +1 more source

On some quasigroup cryptographical primitives

open access: yes, 2011
11 ...
Csorgo, Piroska, Shcherbacov, Victor
openaire   +2 more sources

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

The Symmetrical Block Rsb-32 Encryption Algorithm With Dynamic Encryption Settings.

open access: yesÌнформаційні технології в освіті, 2009
An iterative algorithm used with variable block size of public key encryption, multiple 32-m bits. Encrypt text runs in steps. As cryptographic primitives are used: stochastic scrolling block, bi-directional sliding coding, nonlinear and stochastic ...
A. Beletsky, A. Beletsky
doaj  

Multikey Verifiable Homomorphic Encryption

open access: yesIEEE Access, 2022
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj   +1 more source

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

Institutional Environment and the Use of Blockchain Technology: Exploring the Context and Conditions of Using Blockchain in the Higher Education Institutions

open access: yesHigher Education Quarterly, Volume 79, Issue 3, July 2025.
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy