Results 101 to 110 of about 96,237 (302)
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly+3 more
doaj +1 more source
Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen+4 more
wiley +1 more source
Cryptographic protocols in practice [PDF]
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core
Comment on "Quantum identification schemes with entanglements"
In a recent paper, [Phys. Rev. A 65, 052326 (2002)], Mihara presented several cryptographic protocols that were claimed to be quantum mechanical in nature. In this comment it is pointed out that these protocols can be described in purely classical terms.
van Dam, Wim
core +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci+7 more
wiley +1 more source
How to Guarantee Secrecy for Cryptographic Protocols [PDF]
In this paper we propose a general definition of secrecy for cryptographic protocols in the Dolev-Yao model. We give a sufficient condition ensuring secrecy for protocols where rules have encryption depth at most two, that is satisfied by almost all practical protocols.
arxiv
Modelling and Analysis of Quantum Key Distribution Protocols, BB84 and B92, in Communicating Quantum Processes(CQP) language and Analysing in PRISM [PDF]
Proof of security of cryptographic protocols theoretically establishes the strength of a protocol and the constraints under which it can perform, it does not take into account the overall design of the protocol. In the past model checking has been successfully applied to classical cryptographic protocols to weed out design flaws which would have ...
arxiv +1 more source
Tailored Growth of Transition Metal Dichalcogenides’ Monolayers by Chemical Vapor Deposition
Here, results on the tailored growth of various 2D semiconductors’ monolayers of transition metal dichalcogenides are presented using chemical vapor deposition techniques. Basic electronic, photonic and optoelectronic properties of the grown quantum materials are studied by high‐resolution microscopy and spectroscopy techniques and are analyzed for ...
Andrey Turchanin, Antony George
wiley +1 more source
A Novel Scalable Quantum Protocol for the Dining Cryptographers Problem [PDF]
This paper presents an innovative entanglement-based protocol to address the Dining Cryptographers Problem, utilizing maximally entangled $\ket{ GHZ_{ n } }$ tuples as its core. This protocol aims to provide scalability in terms of both the number of cryptographers $n$ and the amount of anonymous information conveyed, represented by the number of ...
arxiv +1 more source
Federated Learning Architectures: A Performance Evaluation With Crop Yield Prediction Application
ABSTRACT Introduction Federated learning has become an emerging technology in data analysis for IoT applications. Methods This paper implements centralized and decentralized federated learning frameworks for crop yield prediction based on Long Short‐Term Memory Network and Gated Recurrent Unit.
Anwesha Mukherjee, Rajkumar Buyya
wiley +1 more source