Results 81 to 90 of about 21,314 (180)
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts [PDF]
Riccardo Longo+4 more
openalex +1 more source
Cryptographic Primitives Based on Hard Learning Problems [PDF]
Modern cryptography has had considerable impact on the development of computational learning theory. Virtually every intractability result in Valiant’s model [13] (which is representation-independent in the sense that it does not rely on an artificial syntactic restriction on the learning algorithm’s hypotheses) has at its heart a cryptographic ...
Merrick L. Furst+3 more
openaire +2 more sources
ABSTRACT In recent years, serious games (SGs) have emerged as a powerful tool in education by combining pedagogy and entertainment, facilitating the acquisition of knowledge and skills in engaging environments. SGs enable the collection of valuable interaction data from students, allowing for the analysis of student performance, with artificial ...
Manuel J. Gomez+4 more
wiley +1 more source
Post-quantum signature algorithms based on the hidden discrete logarithm problem [PDF]
New options of the hidden discrete logarithm problem are proposed as cryptographic primitive of the post-quantum signature algorithms. Two signature schemes using computations in finite non-commutative algebras with associative multiplication operation
A.A. Moldovyan, N.A. Moldovyan
doaj
Connectivity of Markoff mod‐p graphs and maximal divisors
Abstract Markoff mod‐p$p$ graphs are conjectured to be connected for all primes p$p$. In this paper, we use results of Chen and Bourgain, Gamburd, and Sarnak to confirm the conjecture for all p>3.45·10392$p > 3.45\cdot 10^{392}$. We also provide a method that quickly verifies connectivity for many primes below this bound.
Jillian Eddy+4 more
wiley +1 more source
No Superluminal Signaling Implies Unconditionally Secure Bit Commitment [PDF]
Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple,
Chau, H. F.+2 more
core
Advances in Metal Halide Perovskite Memristors: A Review from a Co‐Design Perspective
This work presents a thorough review of the metal halide perovskite (MHP) memristors, covering materials to applications. The design principles and critical factors affecting device performance are summarized. The mechanism of MHP memristors is also concerned with deeper insight into fundamental principles.
Bowen Jiang+10 more
wiley +1 more source
Efficient Length Doubling From Tweakable Block Ciphers
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n − 1].
Yu Long Chen+3 more
doaj +1 more source
We develop an anonymous authentication scheme for smart cities based on physically unclonable function and user biometrics. This scheme is shown to be robust against active and passive attacks. ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data ...
Vincent Omollo Nyangaresi+4 more
wiley +1 more source