Results 81 to 90 of about 367,345 (251)
Security Guidelines for Implementing Homomorphic Encryption
Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows performing arbitrary operations on encrypted data. Since the conception of the idea in [RAD78], it has been considered a holy grail of cryptography.
Jean-Philippe Bossuat +18 more
semanticscholar +1 more source
Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Carmen Camara +3 more
doaj +1 more source
Post-Quantum Cryptographic Hardware Primitives
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In this work, we introduce a set of hardware post-quantum cryptographic primitives (PCPs) consisting of four frequently used security ...
Bu, Lake +3 more
openaire +2 more sources
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
—Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permis-sionless blockchain technology. Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability issues ...
Giulio Malavolta +4 more
semanticscholar +1 more source
A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah +4 more
doaj +1 more source
On the composable security of weak coin flipping [PDF]
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu +3 more
doaj +1 more source
Quantum Security of Cryptographic Primitives
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire +3 more sources
Dual receiver encryption (DRE) is an important cryptographic primitive introduced by Diament et al. at CCS’04, which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.
Yanyan Liu, Daode Zhang, Yi Deng, Bao Li
doaj +1 more source
A European Call for Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation [PDF]
Joos Vandewalle +5 more
openalex +1 more source

