Results 11 to 20 of about 19,120,707 (376)
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits [PDF]
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS '10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c' ≠ c , then the tampered message x' contained in c' reveals ...
Sebastian Faust +3 more
openalex +4 more sources
Factorization of big integer and the security of RSA
Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely ...
Yan-bing REN
doaj +3 more sources
Refined finite-size analysis of binary-modulation continuous-variable quantum key distribution [PDF]
Recent studies showed the finite-size security of binary-modulation CV-QKD protocols against general attacks. However, they gave poor key-rate scaling against transmission distance.
Takaya Matsuura +4 more
doaj +1 more source
A Dynamic-Routing Algorithm Based on a Virtual Quantum Key Distribution Network
Quantum key distribution (QKD) is an encrypted communication technique based on the principles of quantum mechanics that ensures communication security by exploiting the properties of quantum states.
Lin Bi, Minghui Miao, Xiaoqiang Di
doaj +1 more source
Key-Locked Rank One Editing for Text-to-Image Personalization [PDF]
Text-to-image models (T2I) offer a new level of flexibility by allowing users to guide the creative process through natural language. However, personalizing these models to align with user-provided visual concepts remains a challenging problem.
Yoad Tewel +3 more
semanticscholar +1 more source
Introduction Effective coverage of Human Immunodeficiency Virus prevention services for Key Populations (KPs) including female sex workers (FSWs), men who have sex with men (MSM), people who inject drugs (PWID) and transgender (TG) people necessitates ...
Faran Emmanuel +11 more
doaj +1 more source
Finite-key-size effect in a commercial plug-and-play QKD system [PDF]
A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted ...
Poompong Chaiwongkhot +3 more
semanticscholar +1 more source
Background Estimating the population sizes of key populations(people who inject drugs, men who have sex with men, transgender persons, and commercial sex workers) is critical for understanding the overall Human Immunodeficiency Virus burden. This scoping
Chen Xu +9 more
doaj +1 more source
Effects of Smartphone Size and Hand Size on Grip Posture in One-Handed Hard Key Operations
Greater understanding of the grip postures preferred by users is needed for the ergonomic design of smartphone user interfaces. The present study identifies user-preferred grip postures by smartphone size and hand size in one-handed hard key operations ...
Younggeun Choi +4 more
doaj +1 more source
We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum state ...
Shengjie Xu +5 more
doaj +1 more source

