Results 61 to 70 of about 1,839,178 (288)
Cryptographic protocols with everyday objects [PDF]
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire +4 more sources
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni +6 more
wiley +1 more source
Minimum Round Card-Based Cryptographic Protocols Using Private Operations
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure ...
Hibiki Ono, Yoshifumi Manabe
doaj +1 more source
A bisimulation method for cryptographic protocols [PDF]
Summary: We introduce a definition of bisimulation for cryptographic protocols. The definition includes a simple and precise model of the knowledge of the environment with which a protocol interacts. Bisimulation is the basis of an effective proof technique, which yields proofs of classical security properties of protocols and also justifies certain ...
Andrew D. Gordon, Martín Abadi
openaire +3 more sources
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao +2 more
wiley +1 more source
An unambiguous quantum state discrimination for two nonorthogonal states is demonstrated using a single ion. By implementing a non‐Hermitian Hamiltonian with parity‐time‐reversal (PT) symmetry, two candidate states evolve with different speed and become orthogonal at specific time, hence can be discriminated unambiguously. Experiments are performed for
Chenhao Zhu +5 more
wiley +1 more source
Protocols for symmetric secret key establishment: Modern approach
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis +3 more
doaj +1 more source
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley +1 more source
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj +1 more source

