Results 81 to 90 of about 375,459 (282)

Connectivity of Markoff mod‐p graphs and maximal divisors

open access: yesProceedings of the London Mathematical Society, Volume 130, Issue 2, February 2025.
Abstract Markoff mod‐p$p$ graphs are conjectured to be connected for all primes p$p$. In this paper, we use results of Chen and Bourgain, Gamburd, and Sarnak to confirm the conjecture for all p>3.45·10392$p > 3.45\cdot 10^{392}$. We also provide a method that quickly verifies connectivity for many primes below this bound.
Jillian Eddy   +4 more
wiley   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

Linear solutions for cryptographic nonlinear sequence generators

open access: yes, 2010
This letter shows that linear Cellular Automata based on rules 90/150 generate all the solutions of linear difference equations with binary constant coefficients. Some of these solutions are pseudo-random noise sequences with application in cryptography:
A. Fúster-Sabater   +13 more
core   +1 more source

Advances in Metal Halide Perovskite Memristors: A Review from a Co‐Design Perspective

open access: yesAdvanced Science, Volume 12, Issue 2, January 13, 2025.
This work presents a thorough review of the metal halide perovskite (MHP) memristors, covering materials to applications. The design principles and critical factors affecting device performance are summarized. The mechanism of MHP memristors is also concerned with deeper insight into fundamental principles.
Bowen Jiang   +10 more
wiley   +1 more source

Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
We develop an anonymous authentication scheme for smart cities based on physically unclonable function and user biometrics. This scheme is shown to be robust against active and passive attacks. ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data ...
Vincent Omollo Nyangaresi   +4 more
wiley   +1 more source

Post-quantum signature algorithms based on the hidden discrete logarithm problem [PDF]

open access: yesComputer Science Journal of Moldova, 2018
New options of the hidden discrete logarithm problem are proposed as cryptographic primitive of the post-quantum signature algorithms. Two signature schemes using computations in finite non-commutative algebras with associative multiplication operation
A.A. Moldovyan, N.A. Moldovyan
doaj  

Bio-inspired electronic fingerprint PUF device with single-walled carbon nanotube network surface mediated by M13 bacteriophage template

open access: yesScientific Reports, 2022
Human fingerprints are randomly created during fetal activity in the womb, resulting in unique and physically irreproducible fingerprint patterns that are applicable as a biological cryptographic primitive. Similarly, stochastically knitted single-walled
Jae-Seung Jeong   +4 more
doaj   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts [PDF]

open access: gold, 2022
Riccardo Longo   +4 more
openalex   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Home - About - Disclaimer - Privacy