Results 31 to 40 of about 235,449 (333)

Model Learning and Model Checking of IPSec Implementations for Internet of Things

open access: yesIEEE Access, 2019
With the development of Internet of Things (IoT) technology, the demand for secure communication by smart devices has dramatically increased, and the security of the IoT protocol has become the focus of cyberspace.
Jiaxing Guo   +3 more
doaj   +1 more source

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

A New Era of Cryptography : Quantum Cryptography [PDF]

open access: yesInternational Journal on Cryptography and Information Security, 2016
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire   +2 more sources

Applications of finite geometry in coding theory and cryptography [PDF]

open access: yes, 2011
We present in this article the basic properties of projective geometry, coding theory, and cryptography, and show how finite geometry can contribute to coding theory and cryptography.
Klein, Andreas, Storme, Leo
core   +1 more source

Design and implementation of an energy-efficient Keccak algorithm ASIC

open access: yesDianzi Jishu Yingyong, 2019
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj   +1 more source

Realization Scheme for Visual Cryptography with Computer-generated Holograms [PDF]

open access: yesarXiv, 2022
We propose to realize visual cryptography in an indirect way with the help of computer-generated hologram. At present, the recovery method of visual cryptography is mainly superimposed on transparent film or superimposed by computer equipment, which greatly limits the application range of visual cryptography.
arxiv  

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Quantum-Resistant Cryptography [PDF]

open access: yesarXiv, 2021
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv  

Graphical Methods in Device-Independent Quantum Cryptography [PDF]

open access: yes, 2019
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Breiner, Spencer   +2 more
core   +2 more sources

ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the
Guillaume Barbu   +8 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy