Results 11 to 20 of about 212,764 (321)

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

open access: yesPhotonics, 2022
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang   +6 more
doaj   +1 more source

Experimental Quantum Cryptography [PDF]

open access: yesJournal of Cryptology, 1991
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bennett, Charles H.   +4 more
openaire   +2 more sources

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Acknowledgement to Reviewers of Cryptography in 2018

open access: yesCryptography, 2019
Rigorous peer-review is the corner-stone of high-quality academic publishing [...]
Cryptography Editorial Office
doaj   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

A efficient and robust privacy-preserving framework for cross-device federated learning

open access: yesComplex & Intelligent Systems, 2023
To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates.
Weidong Du   +5 more
doaj   +1 more source

A semantic‐based method for analysing unknown malicious behaviours via hyper‐spherical variational auto‐encoders

open access: yesIET Information Security, 2023
In the User and Entity Behaviour Analytics (UEBA), unknown malicious behaviours are often difficult to be automatically detected due to the lack of labelled data.
Yi‐feng Wang, Yuan‐bo Guo, Chen Fang
doaj   +1 more source

Quantum Erasure Cryptography [PDF]

open access: yes, 2016
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose an erasure-based protocol for quantum key distribution (QKD) that promises inherent security against detector ...
Salih, Hatim
core   +3 more sources

Neural cryptography

open access: yesProceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02., 2004
9th International Conference on Neural Information Processing, Singapore, Nov ...
Kinzel, Wolfgang, Kanter, Ido
openaire   +2 more sources

Home - About - Disclaimer - Privacy