Results 41 to 50 of about 62,745 (179)

Cryptographic protocols with everyday objects [PDF]

open access: yesFormal Aspects of Computing, 2014
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire   +4 more sources

High‐Efficiency Quantum Dot Permeable Electrode Light‐Emitting Triodes for Visible Light Communications and on‐Device Data Encryption

open access: yesAdvanced Materials, EarlyView.
A novel three‐terminal PeLET device vertically integrated through a permeable electrode expands additional functionality beyond conventional two‐terminal devices. the specific mechanism is elucidated of E‐field penetration from the integrated capacitor unit to the LED via transient electroluminescence measurements. The PeLET device enables dual‐channel
Seungmin Shin   +5 more
wiley   +1 more source

Oblivious Transfer based on Key Exchange

open access: yes, 2007
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh   +3 more
core   +1 more source

Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications

open access: yesAdvanced Optical Materials, EarlyView.
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali   +4 more
wiley   +1 more source

Optical Chaos Generation and Applications

open access: yesAdvanced Photonics Research, EarlyView.
This review comprehensively examines optical chaos generation via feedback, injection, and optoelectronic methods, emphasizing bandwidth enhancement and time‐delay suppression. Applications include chaos‐synchronized secure communication, physical random number generation, chaotic lidar for cm‐level detection, distributed fiber sensing, and terahertz ...
Wenhui Chen   +8 more
wiley   +1 more source

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesInternational Journal of Quantum Information, 2011
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers.
Sean Hallgren, Adam Smith, Fang Song
openaire   +5 more sources

Unambiguous Quantum State Discrimination in a PT$\mathcal {PT}$‐Symmetric System of a Single Trapped Ion

open access: yesAdvanced Science, EarlyView.
An unambiguous quantum state discrimination for two nonorthogonal states is demonstrated using a single ion. By implementing a non‐Hermitian Hamiltonian with parity‐time‐reversal (PT) symmetry, two candidate states evolve with different speed and become orthogonal at specific time, hence can be discriminated unambiguously. Experiments are performed for
Chenhao Zhu   +5 more
wiley   +1 more source

On the Design of Cryptographic Primitives

open access: yes, 2010
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater   +10 more
core   +1 more source

Structure and Spectroscopic Characterisation of Phenanthroline‐Based Iodobismuthate(III) Complexes Utilised for Raw Acoustic Signal Classification

open access: yesAdvanced Intelligent Discovery, EarlyView.
Memristors based on trimethylsulfonium (phenanthroline)tetraiodobismuthate have been utilised as a nonlinear node in a delayed feedback reservoir. This system allowed an efficient classification of acoustic signals, namely differentiation of vocalisation of the brushtail possum (Trichosurus vulpecula).
Ewelina Cechosz   +4 more
wiley   +1 more source

Statistical Link Between Bell Nonlocality and Uncertainty Relations in Quantum Mechanics

open access: yesAnnalen der Physik, EarlyView.
Bell nonlocality and uncertainty principle are two distinguished features in quantum mechanics from classical physics. In this work, it is showed the interplay between these two quantum properties. The upper bound of nonlocal correlation strength is determined by accumulation of all local measurement uncertainty, which means that more Bell nonlocality ...
Li‐Yi Hsu
wiley   +1 more source

Home - About - Disclaimer - Privacy