Results 11 to 20 of about 1,976 (52)

Secrecy extraction from no-signalling correlations [PDF]

open access: yes, 2006
Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is without limiting the computational power of the eavesdropper.
A. A. Méthot   +15 more
core   +3 more sources

Compact Coding Using Multi-Photon Tolerant Quantum Protocols for Quantum Communication

open access: yes, 2016
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the ...
Chan, Kam Wai Clifford   +2 more
core   +2 more sources

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [PDF]

open access: yes, 2006
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure ...
Chen, Guanrong   +3 more
core   +2 more sources

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization

open access: yes, 2019
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they
Brasser, Ferdinand   +5 more
core   +1 more source

Collective attacks and unconditional security in continuous variable quantum key distribution

open access: yes, 2004
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core   +1 more source

On an authentication scheme based on the Root Problem in the braid group [PDF]

open access: yes, 2009
Lal and Chaturvedi proposed two authentication schemes based on the difficulty of the Root Problem in the braid group. We point out that the first scheme is not really as secure as the Root Problem, and describe an efficient way to crack it.
Tsaban, Boaz
core  

Genetic attack on neural cryptography

open access: yes, 2006
Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography.
A. Engel   +12 more
core   +1 more source

Secure management of logs in internet of things [PDF]

open access: yes, 2015
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core  

Dynamics of neural cryptography

open access: yes, 2007
Synchronization of neural networks has been used for novel public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive ...
A. Engel   +9 more
core   +1 more source

Perfectly secure data aggregation via shifted projections

open access: yes, 2015
We study a general scenario where confidential information is distributed among a group of agents who wish to share it in such a way that the data becomes common knowledge among them but an eavesdropper intercepting their communications would be unable ...
Fernández-Duque, David
core   +1 more source

Home - About - Disclaimer - Privacy