Results 81 to 90 of about 1,929,820 (318)
Using of small-scale quantum computers in cryptography with many-qubit entangled states
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert +16 more
core +1 more source
A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський +1 more
doaj +1 more source
Scrambling‐Enhanced Quantum Battery Charging in Black Hole Analogues
By employing a black‐hole‐analog quantum battery constructed from a position‐dependent XY model, its dynamical behavior is investigated through a quench of the scrambling parameter. It is systematically quantified that how the simulated scrambling improves key performance metrics‐namely, stored energy, peak power, and charging time‐thereby offering a ...
Zhilong Liu +3 more
wiley +1 more source
cryptographic Primitives: Insertions, Examples and Open Problems
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev +1 more
doaj
BIOMETRIC AUTHENTICATION UTILIZING CONVOLUTIONAL NEURAL NETWORKS
Relevance. Cryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that ...
Serhii Datsenko, Heorhii Kuchuk
doaj +1 more source
Programming Cryptographic Protocols [PDF]
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
Joshua D. Guttman +3 more
openaire +1 more source
Memristors based on trimethylsulfonium (phenanthroline)tetraiodobismuthate have been utilised as a nonlinear node in a delayed feedback reservoir. This system allowed an efficient classification of acoustic signals, namely differentiation of vocalisation of the brushtail possum (Trichosurus vulpecula).
Ewelina Cechosz +4 more
wiley +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater +10 more
core +1 more source
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj +1 more source

