Results 91 to 100 of about 1,901,421 (313)

CMOS compatible multi‐state memristor for neuromorphic hardware encryption with low operation voltage

open access: yesInfoMat, EarlyView.
With the development of artificial intelligence and big data, hardware encryption has emerged as a key technology for secure communication. This study developed an HfAlOx‐based memristor with eight distinguishable resistance states, and realized novel neuromorphic hardware encryption.
Bo Sun   +6 more
wiley   +1 more source

Model checking of trusted cryptographic module

open access: yesTongxin xuebao, 2010
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj   +2 more sources

LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory

open access: yesIET Information Security
The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security ...
Fusheng Wu   +3 more
doaj   +1 more source

On the cryptographic properties of “Limonnik-3” AKE scheme

open access: yesБезопасность информационных технологий, 2019
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the ...
Sergey V. Grebnev
doaj   +1 more source

Agile and Versatile Quantum Communication: Signatures and Secrets

open access: yesPhysical Review X, 2021
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter   +9 more
doaj   +1 more source

Multi-exponentiation (cryptographic protocols) [PDF]

open access: yesIEE Proceedings - Computers and Digital Techniques, 1994
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.
S.-M. Yen, C.-S. Laih, A.K. Lenstra
openaire   +2 more sources

Cylindrical Vector Beam Multiplexing based on All‐Dielectric Fiber Meta‐Tips Enabling High‐Capacity Bidirectional Optical Communication

open access: yesLaser &Photonics Reviews, EarlyView.
Cylindrical vector beam (CVB) multiplexing offers a viable solution to channel capacity, integration, and unidirectional transmission challenges in fiber‐rich sixth‐generation backbone networks. An all‐dielectric fiber meta‐tip‐enabled CVB multiplexing system is proposed and demonstrated, providing high‐capacity, bidirectional optical interconnects and
Jinke Li   +3 more
wiley   +1 more source

Authentication and common key generation cryptographic protocol for vehicle tachographs

open access: yesБезопасность информационных технологий, 2017
We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms.
Victor S. Gorbatov   +2 more
doaj   +1 more source

Functional and phylogenetic beta diversity response of nocturnal moth assemblages to land‐use intensity in grasslands and forests

open access: yesOikos, EarlyView.
Land‐use intensification is filtering for species, able to cope with anthropogenic landscapes. This was assumed to result in functionally and phylogenetically homogenous communities, but a recent meta‐analysis could not confirm a consistent homogenization response to human pressure and raises open questions.
Marcel Püls   +10 more
wiley   +1 more source

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, EarlyView.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy