Results 81 to 90 of about 96,237 (302)

Minimum Round Card-Based Cryptographic Protocols Using Private Operations

open access: yesCryptography, 2021
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure ...
Hibiki Ono, Yoshifumi Manabe
doaj   +1 more source

Bias‐Independent True Random Number Generator Circuit using Memristor Noise Signals as Entropy Source

open access: yesAdvanced Intelligent Systems, EarlyView.
Random telegraph noise (RTN) characteristics of memristor depend on external environmental conditions. To avoid these bias‐dependent characteristics, a true random number generator circuit using the RTN current fluctuations of memristor is presented with an edge detection circuit and counter, and bias independence is experimentally demonstrated for ...
Jinwoo Park, Hyunjoong Kim, Hyungjin Kim
wiley   +1 more source

Secure big data collection and processing: Framework, means and opportunities

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue 4, Page 1541-1559, October 2022., 2022
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley   +1 more source

Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer

open access: yesApplied Sciences, 2018
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj   +1 more source

Protocols for symmetric secret key establishment: Modern approach

open access: yesVojnotehnički Glasnik, 2022
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis   +3 more
doaj   +1 more source

Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication

open access: yes, 2006
We investigate the error tolerance of quantum cryptographic protocols using $d$-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical ...
A. Acín   +8 more
core   +1 more source

Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies

open access: yesInternational Journal of Finance &Economics, EarlyView.
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Highly durable and energy‐efficient probabilistic bits based on h‐BN/SnS2 interface for integer factorization

open access: yesInfoMat, EarlyView.
This study introduces a novel probabilistic bit (p‐bit) device utilizing advanced materials, hexagonal boron nitride (h‐BN) and tin disulfide (SnS2), to enhance durability and energy efficiency in computational applications. By leveraging the stochastic behavior of electron trapping and detrapping at the h‐BN/SnS2 interface, the device achieves ...
Joon‐Kyu Han   +5 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

Home - About - Disclaimer - Privacy