Results 91 to 100 of about 138,401 (282)

Recovering Secrets From Prefix-Dependent Leakage

open access: yesJournal of Mathematical Cryptology, 2020
We discuss how to recover a secret bitstring given partial information obtained during a computation over that string, assuming the computation is a deterministic algorithm processing the secret bits sequentially.
Ferradi Houda   +4 more
doaj   +1 more source

Cryptanalysis of some protocols using matrices over group rings

open access: yes, 2015
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.
Eftekhari, Mohammad
core  

Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain

open access: yesAdvanced Science, EarlyView.
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio   +3 more
wiley   +1 more source

On the asymptotic effectiveness of Weil descent attacks

open access: yesJournal of Mathematical Cryptology, 2010
In this paper we investigate the asymptotic effectiveness of the Gaudry–Hess–Smart Weil descent attack and its generalization to the discrete logarithm problem for elliptic curves over characteristic-two finite fields.
Karabina Koray   +3 more
doaj   +1 more source

A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges   +2 more
doaj   +1 more source

Solid Harmonic Wavelet Bispectrum for Image Analysis

open access: yesAdvanced Science, EarlyView.
The Solid Harmonic Wavelet Bispectrum (SHWB), a rotation‐ and translation‐invariant descriptor that captures higher‐order (phase) correlations in signals, is introduced. Combining wavelet scattering, bispectral analysis, and group theory, SHWB achieves interpretable, data‐efficient representations and demonstrates competitive performance across texture,
Alex Brown   +3 more
wiley   +1 more source

Quantum algorithm for solving binary hyperelliptic curve discrete logarithm problem

open access: yesCybersecurity
It is well-established that Shor’s algorithm can solve the discrete logarithm problem (DLP) in polynomial time. The hyperelliptic curve DLP (HCDLP) of genus 2 has found widespread industrial applications and remains an active research domain.
Yan Huang   +4 more
doaj   +1 more source

Photon‐Sphere Modes in Curved Optical Microcavities: A Black‐Hole Analogue Laser

open access: yesAdvanced Science, EarlyView.
An optical analogue of a Schwarzschild black hole is realized using curved microcavities that preserve light‐like geodesics. A new family of laser modes confined around the photon sphere is identified alongside conventional whispering‐gallery modes. Analytical theory, numerical simulations, and experiments reveal curvature‐induced confinement, enabling
Chenni Xu   +9 more
wiley   +1 more source

Neural Network‐Based Permittivity Engineering of Magnetic Absorbers for Customizable Microwave Absorption

open access: yesAdvanced Science, EarlyView.
A neural network‐enabled permittivity engineering paradigm is introduced, transcending traditional trial‐and‐error design. By decoupling electromagnetic parameters and screening a high‐throughput feature space, an ultrathin (1.0 mm) magnetic absorber is inversely designed, experimentally achieving a superior and customizable 5.1 GHz bandwidth and ...
Chenxi Liu   +9 more
wiley   +1 more source

Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings

open access: yesJournal of Mathematical Cryptology, 2020
ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which are based on number theoretic problems such as discrete
Pandey Atul   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy