Results 81 to 90 of about 65,031 (278)
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly +3 more
doaj +1 more source
Cryptographic protocols in practice [PDF]
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley +1 more source
A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський +1 more
doaj +1 more source
Cheat Sensitive Quantum Bit Commitment
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating.
Adrian Kent +8 more
core +1 more source
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source
By exploiting the strong nonlinear optical response and controllable molecular ordering of ferroelectric nematic liquid crystals (FNLCs), these materials can serve as tunable sources of polarization‐entangled photons. Adjusting the sample geometry or applying an external electric field enables continuous control of the entanglement degree, advancing ...
Sara Klopčič +3 more
wiley +1 more source
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
cryptographic Primitives: Insertions, Examples and Open Problems
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev +1 more
doaj
BIOMETRIC AUTHENTICATION UTILIZING CONVOLUTIONAL NEURAL NETWORKS
Relevance. Cryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that ...
Serhii Datsenko, Heorhii Kuchuk
doaj +1 more source

