Results 81 to 90 of about 375,459 (282)
Connectivity of Markoff mod‐p graphs and maximal divisors
Abstract Markoff mod‐p$p$ graphs are conjectured to be connected for all primes p$p$. In this paper, we use results of Chen and Bourgain, Gamburd, and Sarnak to confirm the conjecture for all p>3.45·10392$p > 3.45\cdot 10^{392}$. We also provide a method that quickly verifies connectivity for many primes below this bound.
Jillian Eddy+4 more
wiley +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
Linear solutions for cryptographic nonlinear sequence generators
This letter shows that linear Cellular Automata based on rules 90/150 generate all the solutions of linear difference equations with binary constant coefficients. Some of these solutions are pseudo-random noise sequences with application in cryptography:
A. Fúster-Sabater+13 more
core +1 more source
Advances in Metal Halide Perovskite Memristors: A Review from a Co‐Design Perspective
This work presents a thorough review of the metal halide perovskite (MHP) memristors, covering materials to applications. The design principles and critical factors affecting device performance are summarized. The mechanism of MHP memristors is also concerned with deeper insight into fundamental principles.
Bowen Jiang+10 more
wiley +1 more source
We develop an anonymous authentication scheme for smart cities based on physically unclonable function and user biometrics. This scheme is shown to be robust against active and passive attacks. ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data ...
Vincent Omollo Nyangaresi+4 more
wiley +1 more source
Post-quantum signature algorithms based on the hidden discrete logarithm problem [PDF]
New options of the hidden discrete logarithm problem are proposed as cryptographic primitive of the post-quantum signature algorithms. Two signature schemes using computations in finite non-commutative algebras with associative multiplication operation
A.A. Moldovyan, N.A. Moldovyan
doaj
Human fingerprints are randomly created during fetal activity in the womb, resulting in unique and physically irreproducible fingerprint patterns that are applicable as a biological cryptographic primitive. Similarly, stochastically knitted single-walled
Jae-Seung Jeong+4 more
doaj +1 more source
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel+6 more
wiley +1 more source
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts [PDF]
Riccardo Longo+4 more
openalex +1 more source
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source