Results 31 to 40 of about 177,532 (270)

Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher

open access: yesCTU Journal of Innovation and Sustainable Development
In this study, we present in detail the application of Grover's quantum algorithm to the searching problem of the secret key of a simple SPN (Substitution–permutation network) block cipher called Yo-yo.
Minh Thang Vu   +3 more
doaj   +3 more sources

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography [PDF]

open access: yes, 2017
The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. We consider mathematical problems related to the construction of algebraic immune vectorial Boolean functions and ...
Agievich, S.   +7 more
core   +3 more sources

Cryptography - Lecture 3: Modern cryptography

open access: yes, 2022
Cryptography - Lecture 3: Modern cryptography This lecture is devoted to general description of basic ideas of the modern cryptography - block ciphers (DES, AES) and public key cryptography (secret transmission, electronic signature, key exchange and secret sharing schemes)
openaire   +2 more sources

Kleptography: Using Cryptography Against Cryptography [PDF]

open access: yes, 1997
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal
Adam Young, Moti Yung
openaire   +1 more source

Single photon quantum cryptography [PDF]

open access: yes, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos   +10 more
core   +2 more sources

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

A Pseudo DNA Cryptography Method

open access: yes, 2009
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation.
Celland   +20 more
core   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

A Comparison of Cryptography Courses

open access: yes, 2004
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core   +1 more source

Home - About - Disclaimer - Privacy