Results 101 to 110 of about 96,237 (302)

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly   +3 more
doaj   +1 more source

Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons

open access: yesAdvanced Quantum Technologies, EarlyView.
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen   +4 more
wiley   +1 more source

Cryptographic protocols in practice [PDF]

open access: yes, 2009
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core  

Comment on "Quantum identification schemes with entanglements"

open access: yes, 2003
In a recent paper, [Phys. Rev. A 65, 052326 (2002)], Mihara presented several cryptographic protocols that were claimed to be quantum mechanical in nature. In this comment it is pointed out that these protocols can be described in purely classical terms.
van Dam, Wim
core   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

How to Guarantee Secrecy for Cryptographic Protocols [PDF]

open access: yesRapport interne (03/2007), 2007
In this paper we propose a general definition of secrecy for cryptographic protocols in the Dolev-Yao model. We give a sufficient condition ensuring secrecy for protocols where rules have encryption depth at most two, that is satisfied by almost all practical protocols.
arxiv  

Modelling and Analysis of Quantum Key Distribution Protocols, BB84 and B92, in Communicating Quantum Processes(CQP) language and Analysing in PRISM [PDF]

open access: yes, 2016
Proof of security of cryptographic protocols theoretically establishes the strength of a protocol and the constraints under which it can perform, it does not take into account the overall design of the protocol. In the past model checking has been successfully applied to classical cryptographic protocols to weed out design flaws which would have ...
arxiv   +1 more source

Tailored Growth of Transition Metal Dichalcogenides’ Monolayers by Chemical Vapor Deposition

open access: yesSmall, EarlyView.
Here, results on the tailored growth of various 2D semiconductors’ monolayers of transition metal dichalcogenides are presented using chemical vapor deposition techniques. Basic electronic, photonic and optoelectronic properties of the grown quantum materials are studied by high‐resolution microscopy and spectroscopy techniques and are analyzed for ...
Andrey Turchanin, Antony George
wiley   +1 more source

A Novel Scalable Quantum Protocol for the Dining Cryptographers Problem [PDF]

open access: yes
This paper presents an innovative entanglement-based protocol to address the Dining Cryptographers Problem, utilizing maximally entangled $\ket{ GHZ_{ n } }$ tuples as its core. This protocol aims to provide scalability in terms of both the number of cryptographers $n$ and the amount of anonymous information conveyed, represented by the number of ...
arxiv   +1 more source

Federated Learning Architectures: A Performance Evaluation With Crop Yield Prediction Application

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Introduction Federated learning has become an emerging technology in data analysis for IoT applications. Methods This paper implements centralized and decentralized federated learning frameworks for crop yield prediction based on Long Short‐Term Memory Network and Gated Recurrent Unit.
Anwesha Mukherjee, Rajkumar Buyya
wiley   +1 more source

Home - About - Disclaimer - Privacy