Results 51 to 60 of about 2,626,008 (101)

A note on the security of the hHB protocol [PDF]

open access: yesarXiv, 2015
We propose a polynomial-time attack on the hHB protocol, showing that the protocol does not attain the claimed security. Our attack is based on the GRS attack.
arxiv  

Full Restoration of Visual Encrypted Color Images [PDF]

open access: yesarXiv, 2011
While strictly black and white images have been the basis for visual cryptography, there has been a lack of an easily implemented format for colour images. This paper establishes a simple, yet secure way of implementing visual cryptography with colour, assuming a binary data representation.
arxiv  

Virtual Entanglement and Reconciliation Protocols for Quantum Cryptography with Continuous Variables

open access: yes, 2003
We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob.
Cerf, N. J.   +4 more
core   +1 more source

A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]

open access: yes, 2017
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, AndrĂ©   +1 more
core   +1 more source

A method to Implement the Kerberos User Authentication and the secured Internet Service [PDF]

open access: yesarXiv, 2016
This paper proposes a PKINIT_AS Kerberos V5 authentication system to use public key cryptography and a method to implement the gssapi_krb authentication method and secured Internet service using it in IPSec ...
arxiv  

Modern Symmetric Cryptography methodologies and its applications [PDF]

open access: yesarXiv, 2009
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper.
arxiv  

Public-key cryptography and invariant theory [PDF]

open access: yesarXiv, 2002
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
arxiv  

Aryabhata's Mathematics [PDF]

open access: yesarXiv, 2010
This paper presents certains aspects of the mathematics of Aryabhata that are of interest to the cryptography community.
arxiv  

Tropical cryptography II: extensions by homomorphisms [PDF]

open access: yesarXiv, 2018
We use extensions of tropical algebras as platforms for very efficient public key exchange protocols.
arxiv  

In Things We Trust? Towards trustability in the Internet of Things [PDF]

open access: yesarXiv, 2011
This essay discusses the main privacy, security and trustability issues with the Internet of Things.
arxiv  

Home - About - Disclaimer - Privacy