Results 11 to 20 of about 42,947 (261)

Quantum cryptography [PDF]

open access: yesContemporary Physics, 1995
36 pages in compressed PostScript format, 10 PostScript figures compressed tar ...
G. G. Luther   +5 more
openaire   +2 more sources

Lattice Enumeration with Discrete Pruning: Improvements, Cost Estimation and Optimal Parameters

open access: yesMathematics, 2023
Lattice enumeration is a linear-space algorithm for solving the shortest lattice vector problem (SVP). Extreme pruning is a practical technique for accelerating lattice enumeration, which has a mature theoretical analysis and practical implementation ...
Luan Luan   +3 more
doaj   +1 more source

ON QUANTUM CRYPTOGRAPHY [PDF]

open access: yesЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.
Jaćimovski, Stevo   +2 more
openaire   +3 more sources

Acknowledgement to Reviewers of Cryptography in 2018

open access: yesCryptography, 2019
Rigorous peer-review is the corner-stone of high-quality academic publishing [...]
Cryptography Editorial Office
doaj   +1 more source

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

open access: yesEntropy, 2021
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu   +9 more
doaj   +1 more source

A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart ...
Qi Xie   +5 more
doaj   +1 more source

Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels

open access: yesApplied Sciences, 2021
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu   +9 more
doaj   +1 more source

Watermarking Is Not Cryptography [PDF]

open access: yes, 2006
The fields of cryptography and communications are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that permits each layer to be independently designed. It is generally agreed that watermarking, i.e.
Cox, Ingemar   +2 more
openaire   +3 more sources

A efficient and robust privacy-preserving framework for cross-device federated learning

open access: yesComplex & Intelligent Systems, 2023
To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates.
Weidong Du   +5 more
doaj   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy