Results 1 to 10 of about 7,526,383 (337)
Finite Key Size Analysis of Two-Way Quantum Cryptography [PDF]
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Jesni Shamsul Shaari, Stefano Mancini
doaj +9 more sources
Bucket Hashing with a Small Key Size [PDF]
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to "bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket, hash family
Thomas Johansson
openalex +2 more sources
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits [PDF]
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS '10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c' ≠ c , then the tampered message x' contained in c' reveals ...
Sebastian Faust +3 more
openalex +3 more sources
Sifting attacks in finite-size quantum key distribution
A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation.
Corsin Pfister +3 more
doaj +7 more sources
Comparative performance of multiple-list estimators of key population size.
Estimates of the sizes of key populations (KPs) affected by HIV, including men who have sex with men, female sex workers and people who inject drugs, are required for targeting epidemic control efforts where they are most needed. Unfortunately, different
Steve Gutreuter
doaj +3 more sources
Vocabulary Size Is a Key Factor in Predicting Second Language Lexical Encoding Accuracy [PDF]
This study investigates the relationship between the accuracy of second language lexical representations and perception, phonological short-term memory, inhibitory control, attention control, and second language vocabulary size. English-speaking learners
Danielle Daidone, Isabelle Darcy
doaj +2 more sources
Finite-Size Security for Discrete-Modulated Continuous-Variable Quantum Key Distribution Protocols
Discrete-modulated (DM) continuous-variable quantum key distribution (CV-QKD) protocols are promising candidates for commercial implementations of quantum communication networks due to their experimental simplicity.
Florian Kanitschar +4 more
doaj +3 more sources
Hepatitis C prevalence and key population size estimate updates in San Francisco: 2015 to 2019.
BackgroundIn 2017, San Francisco's initiative to locally eliminate hepatitis C virus (HCV) as a public health threat, End Hep C SF, generated an estimate of city-wide HCV prevalence in 2015, but only incorporated limited information about population HCV ...
Shelley N Facente +8 more
doaj +4 more sources
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj +1 more source
Selecting Cryptographic Key Sizes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Eric R. Verheul, Arjen K. Lenstra
openaire +7 more sources

