Results 131 to 140 of about 235,449 (333)
Post-Quantum Cryptography [PDF]
In this survey we propose to cover the prose of post-quantum cryptography over classical cryptography. We talk about the various cryptographic methods that are being practiced to safeguard our information. The future of secure communication is expected to be the implementation of quantum-safe cryptographic systems, and that in the post-quantum era, the
arxiv
Some application of difference equations in Cryptography and Coding Theory [PDF]
In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.
arxiv
On the generation of cryptographically strong pseudorandom sequences [PDF]
Adi Shamir
openalex +1 more source
Prostate cancer is a leading malignancy with significant clinical heterogeneity in men. An 11‐gene signature derived from dysregulated epithelial cell markers effectively predicted biochemical recurrence‐free survival in patients who underwent radical surgery or radiotherapy.
Zhuofan Mou, Lorna W. Harries
wiley +1 more source
Problems in group theory motivated by cryptography [PDF]
This is a survey of algorithmic problems in group theory, old and new, motivated by applications to cryptography.
arxiv
On the generation of cryptographically strong pseudo-random sequences [PDF]
Adi Shamir
openalex +1 more source
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
Post Quantum Cryptography and its Comparison with Classical Cryptography [PDF]
Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions
arxiv
Breaking the Hidden Irreducible Polynomials Scheme [PDF]
In 2019 G\'omez described a new public key cryptography scheme based on ideas from multivariate public key cryptography using hidden irreducible polynomials. We show that the scheme's design has a flaw which lets an attacker recover the private key directly from the public key.
arxiv
Cryptographic sealing for information secrecy and authentication [PDF]
David K. Gifford
openalex +1 more source