Results 81 to 90 of about 63,614 (274)
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi+1 more
core +4 more sources
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater+10 more
core +1 more source
ABSTRACT With trade globalization, food fraud such as tampering, substituting, and falsifying, challenges human health and the management of food supply chain. As a food type that only processed at primary level, the authenticity of fruit supply information has become a guarantee for its edible safety.
Yiqin Zhang+6 more
wiley +1 more source
Using of small-scale quantum computers in cryptography with many-qubit entangled states
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert+16 more
core +1 more source
With the development of artificial intelligence and big data, hardware encryption has emerged as a key technology for secure communication. This study developed an HfAlOx‐based memristor with eight distinguishable resistance states, and realized novel neuromorphic hardware encryption.
Bo Sun+6 more
wiley +1 more source
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj +1 more source
Specifying a Cryptographical Protocol in Lustre and SCADE [PDF]
In Proceedings MARS 2020, arXiv:2004.12403.
openaire +4 more sources
Cylindrical vector beam (CVB) multiplexing offers a viable solution to channel capacity, integration, and unidirectional transmission challenges in fiber‐rich sixth‐generation backbone networks. An all‐dielectric fiber meta‐tip‐enabled CVB multiplexing system is proposed and demonstrated, providing high‐capacity, bidirectional optical interconnects and
Jinke Li+3 more
wiley +1 more source
Land‐use intensification is filtering for species, able to cope with anthropogenic landscapes. This was assumed to result in functionally and phylogenetically homogenous communities, but a recent meta‐analysis could not confirm a consistent homogenization response to human pressure and raises open questions.
Marcel Püls+10 more
wiley +1 more source
Simple, Near-Optimal Quantum Protocols for Die-Rolling
Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj +1 more source