Results 51 to 60 of about 65,060 (255)
Classical Cryptographic Protocols in a Quantum World [PDF]
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core +2 more sources
Programming Cryptographic Protocols [PDF]
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
Joshua D. Guttman +3 more
openaire +1 more source
Deterministic hBN Bubbles as a Versatile Platform for Studies on Single‐Photon Emitters
Single‐photon emitters (SPEs) in hBN are promising for quantum technologies; however, in exfoliated samples their activation is required, limiting reproducibility of previous studies. This work introduces a large‐area MOVPE‐grown hBN platform that hosts SPEs without prior activation.
Piotr Tatarczak +8 more
wiley +1 more source
Comment on "Quantum identification schemes with entanglements"
In a recent paper, [Phys. Rev. A 65, 052326 (2002)], Mihara presented several cryptographic protocols that were claimed to be quantum mechanical in nature. In this comment it is pointed out that these protocols can be described in purely classical terms.
van Dam, Wim
core +1 more source
Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]
International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik +3 more
core +5 more sources
This work introduces a novel approach for encoding and storing information in the liquid state in microdroplet arrays. These liquid‐in‐liquid prints are generated by a droplet printing system capable of dynamically setting the composition of each droplet pixel.
Maximilian Breitfeld +5 more
wiley +1 more source
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko +1 more
doaj +1 more source
Sequential rationality in cryptographic protocols [PDF]
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Gradwohl, Ronen +2 more
openaire +2 more sources
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source

