Results 61 to 70 of about 1,839,178 (288)

Cryptographic protocols with everyday objects [PDF]

open access: yesFormal Aspects of Computing, 2014
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire   +4 more sources

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, EarlyView.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

Minimum Round Card-Based Cryptographic Protocols Using Private Operations

open access: yesCryptography, 2021
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure ...
Hibiki Ono, Yoshifumi Manabe
doaj   +1 more source

A bisimulation method for cryptographic protocols [PDF]

open access: yes, 1998
Summary: We introduce a definition of bisimulation for cryptographic protocols. The definition includes a simple and precise model of the knowledge of the environment with which a protocol interacts. Bisimulation is the basis of an effective proof technique, which yields proofs of classical security properties of protocols and also justifies certain ...
Andrew D. Gordon, Martín Abadi
openaire   +3 more sources

Body Biofluids for Minimally‐Invasive Diagnostics: Insights, Challenges, Emerging Technologies, and Clinical Potential

open access: yesAdvanced Healthcare Materials, EarlyView.
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao   +2 more
wiley   +1 more source

Unambiguous Quantum State Discrimination in a PT$\mathcal {PT}$‐Symmetric System of a Single Trapped Ion

open access: yesAdvanced Science, EarlyView.
An unambiguous quantum state discrimination for two nonorthogonal states is demonstrated using a single ion. By implementing a non‐Hermitian Hamiltonian with parity‐time‐reversal (PT) symmetry, two candidate states evolve with different speed and become orthogonal at specific time, hence can be discriminated unambiguously. Experiments are performed for
Chenhao Zhu   +5 more
wiley   +1 more source

Protocols for symmetric secret key establishment: Modern approach

open access: yesVojnotehnički Glasnik, 2022
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis   +3 more
doaj   +1 more source

Multi‐Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols

open access: yesAdvanced Science, EarlyView.
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley   +1 more source

Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer

open access: yesApplied Sciences, 2018
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy