Results 1 to 10 of about 19,120,707 (376)

Finite Key Size Analysis of Two-Way Quantum Cryptography [PDF]

open access: yesEntropy, 2015
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Jesni Shamsul Shaari, Stefano Mancini
doaj   +9 more sources

Updating Key Size Estimations for Pairings [PDF]

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barbulescu, Razvan, Duquesne, Sylvain
openaire   +5 more sources

Vocabulary Size Is a Key Factor in Predicting Second Language Lexical Encoding Accuracy [PDF]

open access: goldFrontiers in Psychology, 2021
This study investigates the relationship between the accuracy of second language lexical representations and perception, phonological short-term memory, inhibitory control, attention control, and second language vocabulary size. English-speaking learners
Danielle Daidone, Isabelle Darcy
doaj   +2 more sources

Finite-size security of continuous-variable quantum key distribution with digital signal processing [PDF]

open access: yesNature Communications, 2021
While continuous-variable QKD presents many experimental advantages, a full security proof that addresses the most general attacks and digitized signals in the finite-size regime has so far been lacking.
Takaya Matsuura   +3 more
doaj   +2 more sources

Reducing Transformer Key-Value Cache Size with Cross-Layer Attention [PDF]

open access: greenNeural Information Processing Systems
Key-value (KV) caching plays an essential role in accelerating decoding for transformer-based autoregressive large language models (LLMs). However, the amount of memory required to store the KV cache can become prohibitive at long sequence lengths and ...
William T. Brandon   +4 more
openalex   +2 more sources

Bucket Hashing with a Small Key Size [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 1997
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to "bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket, hash family
T. Johansson
openaire   +2 more sources

Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm

open access: yesEngineering Proceedings, 2023
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj   +1 more source

Selecting Cryptographic Key Sizes [PDF]

open access: yesJournal of Cryptology, 2001
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lenstra, A.K., Verheul, E.R.
openaire   +4 more sources

Comparative performance of multiple-list estimators of key population size.

open access: yesPLOS Global Public Health, 2022
Estimates of the sizes of key populations (KPs) affected by HIV, including men who have sex with men, female sex workers and people who inject drugs, are required for targeting epidemic control efforts where they are most needed. Unfortunately, different
Steve Gutreuter
doaj   +1 more source

Home - About - Disclaimer - Privacy