Results 31 to 40 of about 2,626,008 (101)

Survey on Randomness Homomorphic Commitment Schemes [PDF]

open access: yes
Commitment-Schemata sind ein wichtiger Teil der Kryptographie, der es einem Committer ermöglicht, sich für einen verborgenen Wert zu entscheiden und ihn möglicherweise später offenzulegen.
Wülker, Simon
core   +2 more sources

Principle of Need-to-Act [PDF]

open access: yesarXiv, 2017
In this paper, we have introduced the notion of "Principle of Need-to- Act". This principle is essential towards developing secure systems, security solutions and analyzing security of a solution.
arxiv  

Considerations for Cloud Security Operations [PDF]

open access: yesOracle CSO Advisory Board, Cloud Security Session, January, 2016, 2016
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv  

Post-Quantum Secure Cryptographic Algorithms [PDF]

open access: yesarXiv, 2018
An overview on current developments in post quantum ...
arxiv  

Collective attacks and unconditional security in continuous variable quantum key distribution

open access: yes, 2004
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core   +1 more source

QKD Entity Source Authentication: Defense-in-Depth for Post Quantum Cryptography

open access: yes, 2023
Quantum key distribution (QKD) was conceived by Charles Bennett and Gilles Brassard in December of 1984. In the ensuing 39 years QKD systems have been deployed around the world to provide secure encryption for terrestrial as well as satellite ...
Prisco, John J.
core  

Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications [PDF]

open access: yesarXiv, 2011
This paper presents new properties of Primitive Pythagorean Triples (PPT) that have relevance in applications where events of different probability need to be generated and in cryptography.
arxiv  

Application of Classical Encryption Techniques for Securing Data-a Threaded Approach

open access: yes
The process of protecting information by transforming (encrypting) it into an unreadable format is called cryptography. Only those who possess secret key can decipher (decrypt) the message into plain text.
and Ravishankar
semanticscholar   +1 more source

Quantifying Shannon's Work Function for Cryptanalytic Attacks

open access: yes, 2010
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core   +1 more source

Home - About - Disclaimer - Privacy