Pseudorandom number generators based on neural networks: a review
Pseudorandom number generators are deterministic algorithms capable of producing sequences of numbers that appear sufficiently ”random,” and they find extensive applications across various domains such as cryptography, network security, communications ...
Xuguang Wu +6 more
doaj +1 more source
Signal fingerprint feature extraction and recognition method for communication satellite
Due to the complex maritime environment, communication satellite signals are inevitably subjected to various unpredictable situations which results in the noisy signal.
Zhen Guo, Kai Huang, Jun Ye
doaj +1 more source
A New Era of Cryptography : Quantum Cryptography
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire +1 more source
Message passing variational autoregressive network for solving intractable Ising models
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma +4 more
doaj +1 more source
A novel multi-carrier visual cryptography scheme based on XOR and OR operations
The conventional Visual Cryptography Scheme (VCS) relying solely on OR operations suffers from poor recovery quality and severe pixel expansion when implemented on physical transparencies.
Yuan Gao +4 more
doaj +1 more source
Improvement of the Minimal-Guess-Basis MILP Model and Its Application to ESF
The guess-and-determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones ...
Lingchen Li +4 more
doaj +1 more source
Secure Quantum Key Distribution
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos +2 more
core +1 more source
EEFDA: enabling efficient and fault-tolerant data aggregation scheme without TA in smart grid
Smart grid can be effectively enhanced by user data, however, data breaches pose significant risks related to privacy violations and data misuse. To address this issue, fault-tolerant privacy-preserving data aggregation schemes can protect data privacy ...
Yuanyuan Wang +4 more
doaj +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
A bimodal lattice-based linearly homomorphic signature for chain-based implicit data storage scheme
As the demand for cross-domain collaborative verification grows in fields such as healthcare and industrial Internet of Things, achieving secure and efficient verification of heterogeneous data has become a critical challenge.
Ruifeng Li +4 more
doaj +1 more source

