Results 21 to 30 of about 334,436 (368)
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor+2 more
semanticscholar +1 more source
Watermarking Is Not Cryptography [PDF]
The fields of cryptography and communications are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that permits each layer to be independently designed. It is generally agreed that watermarking, i.e.
Cox, Ingemar+2 more
openaire +3 more sources
Acknowledgement to Reviewers of Cryptography in 2018
Rigorous peer-review is the corner-stone of high-quality academic publishing [...]
Cryptography Editorial Office
doaj +1 more source
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart ...
Qi Xie+5 more
doaj +1 more source
SoK: Computer-Aided Cryptography
Computer-aided cryptography is an active area of research that develops and applies formal, machine-checkable approaches to the design, analysis, and implementation of cryptography.
M. Barbosa+6 more
semanticscholar +1 more source
Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou+7 more
doaj +1 more source
A efficient and robust privacy-preserving framework for cross-device federated learning
To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates.
Weidong Du+5 more
doaj +1 more source
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang+3 more
doaj +1 more source
Handbook of Applied Cryptography
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and ...
A. Menezes, P. V. Oorschot, S. Vanstone
semanticscholar +1 more source
The relationship between two flavors of oblivious transfer at the quantum level [PDF]
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau+5 more
core +2 more sources