Results 121 to 130 of about 235,449 (333)
Kleptography: Using Cryptography Against Cryptography [PDF]
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal
Adam Young, Moti Yung
openaire +1 more source
Intensity and State Estimation in Quantum Cryptography [PDF]
This paper describes how the communicating parties can employ intensity and state estimation to detect if the eavesdropper has siphoned off and injected photons in the received communication. This is of relevance in quantum cryptography based on random rotations of photon polarizations.
arxiv
Triacsin C inhibition of the acyl‐CoA synthetase long chain (ACSL) family decreases multiple myeloma cell survival, proliferation, mitochondrial respiration, and membrane potential. Made with Biorender.com. Multiple myeloma (MM) is an incurable cancer of plasma cells with a 5‐year survival rate of 59%.
Connor S. Murphy+12 more
wiley +1 more source
Elementary review article on quantum cryptography.
Norbert Lütkenhaus+2 more
openaire +2 more sources
In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications.
Litke, Andreas, Zotos, Kostas
core
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
SQIsign is a well-known post-quantum signature scheme due to its small combined signature and public-key size. However, SQIsign suffers from notably long signing times, and verification times are not short either.
Marius A. Aardal+8 more
doaj +1 more source
A Note on the Bellare-Rivest Protocol for Translucent Cryptography [PDF]
We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications.
arxiv
Completeness theorems for non-cryptographic fault-tolerant distributed computation [PDF]
Michael Ben-Or, Avi Wigderson
openalex +1 more source
Cell‐free DNA aneuploidy score as a dynamic early response marker in prostate cancer
mFast‐SeqS‐based genome‐wide aneuploidy scores are concordant with aneuploidy scores obtained by whole genome sequencing from tumor tissue and can predict response to ARSI treatment at baseline and, at an early time point, to ARSI and taxanes. This assay can be easily performed at low cost and requires little input of cfDNA. Cell‐free circulating tumor
Khrystany T. Isebia+17 more
wiley +1 more source
On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings
White-box cryptography aims at protecting implementations of cryptographic algorithms against a very powerful attacker who controls the execution environment. The first defensive brick traditionally embedded in such implementations consists of encodings,
Laurent Castelnovi, Agathe Houzelot
doaj +1 more source