Results 21 to 30 of about 334,436 (368)

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

open access: yesIEEE Access, 2021
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor   +2 more
semanticscholar   +1 more source

Watermarking Is Not Cryptography [PDF]

open access: yes, 2006
The fields of cryptography and communications are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that permits each layer to be independently designed. It is generally agreed that watermarking, i.e.
Cox, Ingemar   +2 more
openaire   +3 more sources

Acknowledgement to Reviewers of Cryptography in 2018

open access: yesCryptography, 2019
Rigorous peer-review is the corner-stone of high-quality academic publishing [...]
Cryptography Editorial Office
doaj   +1 more source

A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart ...
Qi Xie   +5 more
doaj   +1 more source

SoK: Computer-Aided Cryptography

open access: yesIEEE Symposium on Security and Privacy, 2021
Computer-aided cryptography is an active area of research that develops and applies formal, machine-checkable approaches to the design, analysis, and implementation of cryptography.
M. Barbosa   +6 more
semanticscholar   +1 more source

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

A efficient and robust privacy-preserving framework for cross-device federated learning

open access: yesComplex & Intelligent Systems, 2023
To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates.
Weidong Du   +5 more
doaj   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

Handbook of Applied Cryptography

open access: yes, 2018
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and ...
A. Menezes, P. V. Oorschot, S. Vanstone
semanticscholar   +1 more source

The relationship between two flavors of oblivious transfer at the quantum level [PDF]

open access: yes, 2005
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy