Results 21 to 30 of about 1,976 (52)
In Things We Trust? Towards trustability in the Internet of Things
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura +9 more
core +1 more source
When Mobile Blockchain Meets Edge Computing
Blockchain, as the backbone technology of the current popular Bitcoin digital currency, has become a promising decentralized data management framework.
Han, Zhu +4 more
core +1 more source
Security of Quantum Key Distribution with Coherent States and Homodyne Detection
We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to a squeezed state protocol based on a CSS code construction,
A. Steane +5 more
core +1 more source
Quantifying Shannon's Work Function for Cryptanalytic Attacks
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core +1 more source
Exponential decreasing rate of leaked information in universal random privacy amplification
We derive a new upper bound for Eve's information in secret key generation from a common random number without communication. This bound improves on Bennett et al(1995)'s bound based on the R\'enyi entropy of order 2 because the bound obtained here uses ...
Hayashi, Masahito
core +1 more source
Human behavior in image-based Road Health Inspection Systems despite the emerging AutoML. [PDF]
Siriborvornratanakul T.
europepmc +1 more source
A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, André +1 more
core +1 more source
Ergodic Transformations of the Space of $p$-adic Integers
Let $\mathcal L_1$ be the set of all mappings $f\colon\Z_p\Z_p$ of the space of all $p$-adic integers $\Z_p$ into itself that satisfy Lipschitz condition with a constant 1.
Anashin, Vladimir
core +2 more sources
1. Kryptotag - Workshop über Kryptographie [PDF]
Der Report enthält eine Sammlung aller Beiträge der Teilnehmer des 1. Kryptotages am 1.
Lucks, Stefan, Wolf, Christopher
core +1 more source
The problem with the SURF scheme [PDF]
There is a serious problem with one of the assumptions made in the security proof of the SURF scheme. This problem turns out to be easy in the regime of parameters needed for the SURF scheme to work.
Debris-Alazard, Thomas +2 more
core +1 more source

