Results 21 to 30 of about 1,976 (52)

In Things We Trust? Towards trustability in the Internet of Things

open access: yes, 2011
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura   +9 more
core   +1 more source

When Mobile Blockchain Meets Edge Computing

open access: yes, 2018
Blockchain, as the backbone technology of the current popular Bitcoin digital currency, has become a promising decentralized data management framework.
Han, Zhu   +4 more
core   +1 more source

Security of Quantum Key Distribution with Coherent States and Homodyne Detection

open access: yes, 2003
We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to a squeezed state protocol based on a CSS code construction,
A. Steane   +5 more
core   +1 more source

Quantifying Shannon's Work Function for Cryptanalytic Attacks

open access: yes, 2010
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core   +1 more source

Exponential decreasing rate of leaked information in universal random privacy amplification

open access: yes, 2011
We derive a new upper bound for Eve's information in secret key generation from a common random number without communication. This bound improves on Bennett et al(1995)'s bound based on the R\'enyi entropy of order 2 because the bound obtained here uses ...
Hayashi, Masahito
core   +1 more source

A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]

open access: yes, 2017
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, André   +1 more
core   +1 more source

Ergodic Transformations of the Space of $p$-adic Integers

open access: yes, 2006
Let $\mathcal L_1$ be the set of all mappings $f\colon\Z_p\Z_p$ of the space of all $p$-adic integers $\Z_p$ into itself that satisfy Lipschitz condition with a constant 1.
Anashin, Vladimir
core   +2 more sources

1. Kryptotag - Workshop über Kryptographie [PDF]

open access: yes, 2004
Der Report enthält eine Sammlung aller Beiträge der Teilnehmer des 1. Kryptotages am 1.
Lucks, Stefan, Wolf, Christopher
core   +1 more source

The problem with the SURF scheme [PDF]

open access: yes, 2017
There is a serious problem with one of the assumptions made in the security proof of the SURF scheme. This problem turns out to be easy in the regime of parameters needed for the SURF scheme to work.
Debris-Alazard, Thomas   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy