Results 81 to 90 of about 367,345 (251)

Security Guidelines for Implementing Homomorphic Encryption

open access: yesIACR Cryptology ePrint Archive
Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows performing arbitrary operations on encrypted data. Since the conception of the idea in [RAD78], it has been considered a holy grail of cryptography.
Jean-Philippe Bossuat   +18 more
semanticscholar   +1 more source

Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks

open access: yesSensors, 2019
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Carmen Camara   +3 more
doaj   +1 more source

Post-Quantum Cryptographic Hardware Primitives

open access: yes, 2019
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In this work, we introduce a set of hardware post-quantum cryptographic primitives (PCPs) consisting of four frequently used security ...
Bu, Lake   +3 more
openaire   +2 more sources

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability

open access: yesNetwork and Distributed System Security Symposium, 2019
—Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permis-sionless blockchain technology. Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability issues ...
Giulio Malavolta   +4 more
semanticscholar   +1 more source

A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm

open access: yesIEEE Access
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah   +4 more
doaj   +1 more source

On the composable security of weak coin flipping [PDF]

open access: yesQuantum
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu   +3 more
doaj   +1 more source

Quantum Security of Cryptographic Primitives

open access: yes, 2017
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire   +3 more sources

(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy

open access: yesCybersecurity, 2019
Dual receiver encryption (DRE) is an important cryptographic primitive introduced by Diament et al. at CCS’04, which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.
Yanyan Liu, Daode Zhang, Yi Deng, Bao Li
doaj   +1 more source

A European Call for Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation [PDF]

open access: bronze, 2007
Joos Vandewalle   +5 more
openalex   +1 more source

Home - About - Disclaimer - Privacy