Results 51 to 60 of about 2,626,008 (101)
A note on the security of the hHB protocol [PDF]
We propose a polynomial-time attack on the hHB protocol, showing that the protocol does not attain the claimed security. Our attack is based on the GRS attack.
arxiv
Full Restoration of Visual Encrypted Color Images [PDF]
While strictly black and white images have been the basis for visual cryptography, there has been a lack of an easily implemented format for colour images. This paper establishes a simple, yet secure way of implementing visual cryptography with colour, assuming a binary data representation.
arxiv
Virtual Entanglement and Reconciliation Protocols for Quantum Cryptography with Continuous Variables
We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob.
Cerf, N. J.+4 more
core +1 more source
A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, André+1 more
core +1 more source
A method to Implement the Kerberos User Authentication and the secured Internet Service [PDF]
This paper proposes a PKINIT_AS Kerberos V5 authentication system to use public key cryptography and a method to implement the gssapi_krb authentication method and secured Internet service using it in IPSec ...
arxiv
Modern Symmetric Cryptography methodologies and its applications [PDF]
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper.
arxiv
Public-key cryptography and invariant theory [PDF]
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
arxiv
This paper presents certains aspects of the mathematics of Aryabhata that are of interest to the cryptography community.
arxiv
Tropical cryptography II: extensions by homomorphisms [PDF]
We use extensions of tropical algebras as platforms for very efficient public key exchange protocols.
arxiv
In Things We Trust? Towards trustability in the Internet of Things [PDF]
This essay discusses the main privacy, security and trustability issues with the Internet of Things.
arxiv