Results 31 to 40 of about 212,764 (321)

Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher

open access: yesCTU Journal of Innovation and Sustainable Development
In this study, we present in detail the application of Grover's quantum algorithm to the searching problem of the secret key of a simple SPN (Substitution–permutation network) block cipher called Yo-yo.
Minh Thang Vu   +3 more
doaj   +3 more sources

Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography [PDF]

open access: yes, 2017
The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. We consider mathematical problems related to the construction of algebraic immune vectorial Boolean functions and ...
Agievich, S.   +7 more
core   +3 more sources

Multipartite Classical and Quantum Secrecy Monotones [PDF]

open access: yes, 2002
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl   +22 more
core   +2 more sources

Cryptography - Lecture 3: Modern cryptography

open access: yes, 2022
Cryptography - Lecture 3: Modern cryptography This lecture is devoted to general description of basic ideas of the modern cryptography - block ciphers (DES, AES) and public key cryptography (secret transmission, electronic signature, key exchange and secret sharing schemes)
openaire   +2 more sources

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Kleptography: Using Cryptography Against Cryptography [PDF]

open access: yes, 1997
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal
Adam Young, Moti Yung
openaire   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Tomographic Quantum Cryptography

open access: yes, 2003
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige   +28 more
core   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy