Results 1 to 10 of about 19,120,707 (376)
Finite Key Size Analysis of Two-Way Quantum Cryptography [PDF]
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Jesni Shamsul Shaari, Stefano Mancini
doaj +9 more sources
Updating Key Size Estimations for Pairings [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barbulescu, Razvan, Duquesne, Sylvain
openaire +5 more sources
Vocabulary Size Is a Key Factor in Predicting Second Language Lexical Encoding Accuracy [PDF]
This study investigates the relationship between the accuracy of second language lexical representations and perception, phonological short-term memory, inhibitory control, attention control, and second language vocabulary size. English-speaking learners
Danielle Daidone, Isabelle Darcy
doaj +2 more sources
Finite-size security of continuous-variable quantum key distribution with digital signal processing [PDF]
While continuous-variable QKD presents many experimental advantages, a full security proof that addresses the most general attacks and digitized signals in the finite-size regime has so far been lacking.
Takaya Matsuura +3 more
doaj +2 more sources
Reducing Transformer Key-Value Cache Size with Cross-Layer Attention [PDF]
Key-value (KV) caching plays an essential role in accelerating decoding for transformer-based autoregressive large language models (LLMs). However, the amount of memory required to store the KV cache can become prohibitive at long sequence lengths and ...
William T. Brandon +4 more
openalex +2 more sources
Bucket Hashing with a Small Key Size [PDF]
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to "bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket, hash family
T. Johansson
openaire +2 more sources
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj +1 more source
Selecting Cryptographic Key Sizes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lenstra, A.K., Verheul, E.R.
openaire +4 more sources
Comparative performance of multiple-list estimators of key population size.
Estimates of the sizes of key populations (KPs) affected by HIV, including men who have sex with men, female sex workers and people who inject drugs, are required for targeting epidemic control efforts where they are most needed. Unfortunately, different
Steve Gutreuter
doaj +1 more source

