Results 1 to 10 of about 7,526,383 (337)

Finite Key Size Analysis of Two-Way Quantum Cryptography [PDF]

open access: yesEntropy, 2015
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Jesni Shamsul Shaari, Stefano Mancini
doaj   +9 more sources

Bucket Hashing with a Small Key Size [PDF]

open access: bronze, 1997
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to "bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket, hash family
Thomas Johansson
openalex   +2 more sources

Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits [PDF]

open access: green, 2016
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS '10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c' ≠ c , then the tampered message x' contained in c' reveals ...
Sebastian Faust   +3 more
openalex   +3 more sources

Sifting attacks in finite-size quantum key distribution

open access: yesNew Journal of Physics, 2016
A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation.
Corsin Pfister   +3 more
doaj   +7 more sources

Comparative performance of multiple-list estimators of key population size.

open access: yesPLOS Global Public Health, 2022
Estimates of the sizes of key populations (KPs) affected by HIV, including men who have sex with men, female sex workers and people who inject drugs, are required for targeting epidemic control efforts where they are most needed. Unfortunately, different
Steve Gutreuter
doaj   +3 more sources

Vocabulary Size Is a Key Factor in Predicting Second Language Lexical Encoding Accuracy [PDF]

open access: goldFrontiers in Psychology, 2021
This study investigates the relationship between the accuracy of second language lexical representations and perception, phonological short-term memory, inhibitory control, attention control, and second language vocabulary size. English-speaking learners
Danielle Daidone, Isabelle Darcy
doaj   +2 more sources

Finite-Size Security for Discrete-Modulated Continuous-Variable Quantum Key Distribution Protocols

open access: goldPRX Quantum, 2023
Discrete-modulated (DM) continuous-variable quantum key distribution (CV-QKD) protocols are promising candidates for commercial implementations of quantum communication networks due to their experimental simplicity.
Florian Kanitschar   +4 more
doaj   +3 more sources

Hepatitis C prevalence and key population size estimate updates in San Francisco: 2015 to 2019.

open access: goldPLoS ONE, 2022
BackgroundIn 2017, San Francisco's initiative to locally eliminate hepatitis C virus (HCV) as a public health threat, End Hep C SF, generated an estimate of city-wide HCV prevalence in 2015, but only incorporated limited information about population HCV ...
Shelley N Facente   +8 more
doaj   +4 more sources

Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm

open access: yesEngineering Proceedings, 2023
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj   +1 more source

Selecting Cryptographic Key Sizes [PDF]

open access: yesJournal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Eric R. Verheul, Arjen K. Lenstra
openaire   +7 more sources

Home - About - Disclaimer - Privacy