Results 71 to 80 of about 96,237 (302)
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad+5 more
doaj +1 more source
Fair Exchange in Strand Spaces [PDF]
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman+2 more
core +2 more sources
Cryptographic protocols with everyday objects [PDF]
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire +4 more sources
Self‐Assembled Physical Unclonable Function Labels Based on Plasmonic Coupling
This article introduces advanced anti‐counterfeit labels crafted through DNA‐guided self‐assembly of plasmonic nanoparticles. Utilizing nanosphere lithography for dense and precise nanoparticle placement, these labels feature unique, unclonable optical signatures achieved through plasmonic coupling, detectable by an economical 3D‐printed dark field ...
Mihir Dass+9 more
wiley +1 more source
High-level Cryptographic Abstractions
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham+4 more
core +1 more source
On Some Cryptographic Protocol
In this paper we present a cryptographic protocol for a seller - buyer problem and in particular we prove that non-emptiness of a semi-commutative set defined by mappings involved in the protocol is a decidable problem.
openaire +3 more sources
Stochastic Photoresponse‐Driven Perovskite TRNGs for Secure Encryption Systems
This study presents a hybrid anionic polymer and perovskite TRNG generating 10 000 bits s−1, validated by NIST testing. Exceptional image encryption and implantable potential are demonstrated, highlighting advancements in portable and implantable security devices.
Dante Ahn+12 more
wiley +1 more source
Realizing a blockchain solution without blockchain? Blockchain, solutionism, and trust
Abstract Blockchain is employed as a technology holding a solutionist promise, while at the same time, it is hard for the promissory blockchain applications to become realized. Not only is the blockchain protocol itself not foolproof, but when we move from “blockchain in general” to “blockchain in particular,” we see that new governance structures and ...
Gert Meyers, Esther Keymolen
wiley +1 more source
Finite key size analysis of two-way quantum cryptography [PDF]
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Mancini, Stefano, Shaari, Jesni Shamsul
core +3 more sources
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma+3 more
wiley +1 more source