Results 81 to 90 of about 96,237 (302)
Minimum Round Card-Based Cryptographic Protocols Using Private Operations
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure ...
Hibiki Ono, Yoshifumi Manabe
doaj +1 more source
Random telegraph noise (RTN) characteristics of memristor depend on external environmental conditions. To avoid these bias‐dependent characteristics, a true random number generator circuit using the RTN current fluctuations of memristor is presented with an edge detection circuit and counter, and bias independence is experimentally demonstrated for ...
Jinwoo Park, Hyunjoong Kim, Hyungjin Kim
wiley +1 more source
Secure big data collection and processing: Framework, means and opportunities
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley +1 more source
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj +1 more source
Protocols for symmetric secret key establishment: Modern approach
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis+3 more
doaj +1 more source
We investigate the error tolerance of quantum cryptographic protocols using $d$-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical ...
A. Acín+8 more
core +1 more source
Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley +1 more source
A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський+1 more
doaj +1 more source
This study introduces a novel probabilistic bit (p‐bit) device utilizing advanced materials, hexagonal boron nitride (h‐BN) and tin disulfide (SnS2), to enhance durability and energy efficiency in computational applications. By leveraging the stochastic behavior of electron trapping and detrapping at the h‐BN/SnS2 interface, the device achieves ...
Joon‐Kyu Han+5 more
wiley +1 more source
cryptographic Primitives: Insertions, Examples and Open Problems
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev+1 more
doaj