Results 71 to 80 of about 96,237 (302)

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

open access: yesIEEE Access, 2020
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad   +5 more
doaj   +1 more source

Fair Exchange in Strand Spaces [PDF]

open access: yes, 2009
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman   +2 more
core   +2 more sources

Cryptographic protocols with everyday objects [PDF]

open access: yesFormal Aspects of Computing, 2014
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire   +4 more sources

Self‐Assembled Physical Unclonable Function Labels Based on Plasmonic Coupling

open access: yesAdvanced Optical Materials, EarlyView.
This article introduces advanced anti‐counterfeit labels crafted through DNA‐guided self‐assembly of plasmonic nanoparticles. Utilizing nanosphere lithography for dense and precise nanoparticle placement, these labels feature unique, unclonable optical signatures achieved through plasmonic coupling, detectable by an economical 3D‐printed dark field ...
Mihir Dass   +9 more
wiley   +1 more source

High-level Cryptographic Abstractions

open access: yes, 2019
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham   +4 more
core   +1 more source

On Some Cryptographic Protocol

open access: yesSchedae Informaticae, 2021
In this paper we present a cryptographic protocol for a seller - buyer problem and in particular we prove that non-emptiness of a semi-commutative set defined by mappings involved in the protocol is a decidable problem.
openaire   +3 more sources

Stochastic Photoresponse‐Driven Perovskite TRNGs for Secure Encryption Systems

open access: yesAdvanced Science, EarlyView.
This study presents a hybrid anionic polymer and perovskite TRNG generating 10 000 bits s−1, validated by NIST testing. Exceptional image encryption and implantable potential are demonstrated, highlighting advancements in portable and implantable security devices.
Dante Ahn   +12 more
wiley   +1 more source

Realizing a blockchain solution without blockchain? Blockchain, solutionism, and trust

open access: yesRegulation &Governance, EarlyView., 2023
Abstract Blockchain is employed as a technology holding a solutionist promise, while at the same time, it is hard for the promissory blockchain applications to become realized. Not only is the blockchain protocol itself not foolproof, but when we move from “blockchain in general” to “blockchain in particular,” we see that new governance structures and ...
Gert Meyers, Esther Keymolen
wiley   +1 more source

Finite key size analysis of two-way quantum cryptography [PDF]

open access: yes, 2015
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Mancini, Stefano, Shaari, Jesni Shamsul
core   +3 more sources

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, EarlyView.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy