Results 81 to 90 of about 1,929,820 (318)

Using of small-scale quantum computers in cryptography with many-qubit entangled states

open access: yes, 2004
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert   +16 more
core   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Scrambling‐Enhanced Quantum Battery Charging in Black Hole Analogues

open access: yesAdvanced Science, EarlyView.
By employing a black‐hole‐analog quantum battery constructed from a position‐dependent XY model, its dynamical behavior is investigated through a quench of the scrambling parameter. It is systematically quantified that how the simulated scrambling improves key performance metrics‐namely, stored energy, peak power, and charging time‐thereby offering a ...
Zhilong Liu   +3 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

BIOMETRIC AUTHENTICATION UTILIZING CONVOLUTIONAL NEURAL NETWORKS

open access: yesСучасні інформаційні системи, 2023
Relevance. Cryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that ...
Serhii Datsenko, Heorhii Kuchuk
doaj   +1 more source

Programming Cryptographic Protocols [PDF]

open access: yes, 2005
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
Joshua D. Guttman   +3 more
openaire   +1 more source

Structure and Spectroscopic Characterisation of Phenanthroline‐Based Iodobismuthate(III) Complexes Utilised for Raw Acoustic Signal Classification

open access: yesAdvanced Intelligent Discovery, EarlyView.
Memristors based on trimethylsulfonium (phenanthroline)tetraiodobismuthate have been utilised as a nonlinear node in a delayed feedback reservoir. This system allowed an efficient classification of acoustic signals, namely differentiation of vocalisation of the brushtail possum (Trichosurus vulpecula).
Ewelina Cechosz   +4 more
wiley   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

On the Design of Cryptographic Primitives

open access: yes, 2010
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater   +10 more
core   +1 more source

Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’

open access: yesIET Networks, 2021
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj   +1 more source

Home - About - Disclaimer - Privacy