Results 21 to 30 of about 62,745 (179)
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
Crypto-Verifying Protocol Implementations in ML [PDF]
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core +13 more sources
How much security does Y-00 protocol provide us ? [PDF]
New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the ...
Hasegawa, Toshio+4 more
core +1 more source
Multiparty Quantum Cryptographic Protocol
12 pages, 1 .eps figure, 3 ...
Muhammad Ramzan, M. K. Khan
openaire +4 more sources
Security of Quantum Key Distribution with Entangled Qutrits [PDF]
The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert's cryptographic protocol [Ekert] where qubits are replaced by qutrits ...
Cerf, Nicolas J.+3 more
core +2 more sources
Distributed Cryptographic Protocols
[EN] Trust is the base of modern societies. However, trust is difficult to achieve and can be exploited easily with devastating results. In this thesis, we explore the use of distributed cryptographic protocols to build reliable systems where trust can be replaced by cryptographic and mathematical guarantees.
openaire +2 more sources
Secure quantum channels with correlated twin laser beams
This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cryptographic control procedures.
A. Ekert+10 more
core +1 more source
Programming Cryptographic Protocols [PDF]
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
John D. Ramsdell+3 more
openaire +2 more sources
Using of small-scale quantum computers in cryptography with many-qubit entangled states
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert+16 more
core +1 more source
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer+27 more
core +2 more sources