Results 31 to 40 of about 2,626,008 (101)
Survey on Randomness Homomorphic Commitment Schemes [PDF]
Commitment-Schemata sind ein wichtiger Teil der Kryptographie, der es einem Committer ermöglicht, sich für einen verborgenen Wert zu entscheiden und ihn möglicherweise später offenzulegen.
Wülker, Simon
core +2 more sources
Principle of Need-to-Act [PDF]
In this paper, we have introduced the notion of "Principle of Need-to- Act". This principle is essential towards developing secure systems, security solutions and analyzing security of a solution.
arxiv
Considerations for Cloud Security Operations [PDF]
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv
Post-Quantum Secure Cryptographic Algorithms [PDF]
An overview on current developments in post quantum ...
arxiv
Collective attacks and unconditional security in continuous variable quantum key distribution
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core +1 more source
Security and Communication Networks
semanticscholar +1 more source
QKD Entity Source Authentication: Defense-in-Depth for Post Quantum Cryptography
Quantum key distribution (QKD) was conceived by Charles Bennett and Gilles Brassard in December of 1984. In the ensuing 39 years QKD systems have been deployed around the world to provide secure encryption for terrestrial as well as satellite ...
Prisco, John J.
core
Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications [PDF]
This paper presents new properties of Primitive Pythagorean Triples (PPT) that have relevance in applications where events of different probability need to be generated and in cryptography.
arxiv
Application of Classical Encryption Techniques for Securing Data-a Threaded Approach
The process of protecting information by transforming (encrypting) it into an unreadable format is called cryptography. Only those who possess secret key can decipher (decrypt) the message into plain text.
and Ravishankar
semanticscholar +1 more source
Quantifying Shannon's Work Function for Cryptanalytic Attacks
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core +1 more source