Results 81 to 90 of about 65,031 (278)

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly   +3 more
doaj   +1 more source

Cryptographic protocols in practice [PDF]

open access: yes, 2009
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core  

Multi‐Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols

open access: yesAdvanced Science, EarlyView.
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Cheat Sensitive Quantum Bit Commitment

open access: yes, 2004
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating.
Adrian Kent   +8 more
core   +1 more source

Emergent Behavior in Cybersecurity [PDF]

open access: yes, 2014
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core   +1 more source

Electrically and Geometrically Tunable Photon Pair Entanglement from Ferroelectric Nematic Liquid Crystal

open access: yesAdvanced Science, EarlyView.
By exploiting the strong nonlinear optical response and controllable molecular ordering of ferroelectric nematic liquid crystals (FNLCs), these materials can serve as tunable sources of polarization‐entangled photons. Adjusting the sample geometry or applying an external electric field enables continuous control of the entanglement degree, advancing ...
Sara Klopčič   +3 more
wiley   +1 more source

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, EarlyView.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

BIOMETRIC AUTHENTICATION UTILIZING CONVOLUTIONAL NEURAL NETWORKS

open access: yesСучасні інформаційні системи, 2023
Relevance. Cryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that ...
Serhii Datsenko, Heorhii Kuchuk
doaj   +1 more source

Home - About - Disclaimer - Privacy