Results 11 to 20 of about 180,085 (154)

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +2 more sources

Neural Cryptography

open access: yesProceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02., 2002
Two neural networks which are trained on their mutual output bits show a novel phenomenon: The networks synchronize to a state with identical time dependent weights.
Kanter, Ido, Kinzel, Wolfgang
core   +3 more sources

Tropical cryptography [PDF]

open access: yesCommunications in Algebra, 2014
9 ...
Grigoriev, D., Shpilrain, V.
core   +5 more sources

Arithmetic Cryptography [PDF]

open access: yesJournal of the ACM, 2017
We study the possibility of computing cryptographic primitives in a fully black-box arithmetic model over a finite field F . In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits that make ...
Benny Applebaum   +2 more
openaire   +1 more source

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, Daniel J., Lange, Tanja
openaire   +3 more sources

Experimental Quantum Cryptography [PDF]

open access: yesJournal of Cryptology, 1991
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bennett, Charles H.   +4 more
openaire   +2 more sources

A efficient and robust privacy-preserving framework for cross-device federated learning

open access: yesComplex & Intelligent Systems, 2023
To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates.
Weidong Du   +5 more
doaj   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

A semantic‐based method for analysing unknown malicious behaviours via hyper‐spherical variational auto‐encoders

open access: yesIET Information Security, 2023
In the User and Entity Behaviour Analytics (UEBA), unknown malicious behaviours are often difficult to be automatically detected due to the lack of labelled data.
Yi‐feng Wang, Yuan‐bo Guo, Chen Fang
doaj   +1 more source

Lattice Enumeration with Discrete Pruning: Improvements, Cost Estimation and Optimal Parameters

open access: yesMathematics, 2023
Lattice enumeration is a linear-space algorithm for solving the shortest lattice vector problem (SVP). Extreme pruning is a practical technique for accelerating lattice enumeration, which has a mature theoretical analysis and practical implementation ...
Luan Luan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy