Results 11 to 20 of about 19,120,707 (376)

Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits [PDF]

open access: green, 2016
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS '10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c' ≠ c , then the tampered message x' contained in c' reveals ...
Sebastian Faust   +3 more
openalex   +4 more sources

Factorization of big integer and the security of RSA

open access: yes网络与信息安全学报, 2017
Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely ...
Yan-bing REN
doaj   +3 more sources

Refined finite-size analysis of binary-modulation continuous-variable quantum key distribution [PDF]

open access: yesQuantum, 2023
Recent studies showed the finite-size security of binary-modulation CV-QKD protocols against general attacks. However, they gave poor key-rate scaling against transmission distance.
Takaya Matsuura   +4 more
doaj   +1 more source

A Dynamic-Routing Algorithm Based on a Virtual Quantum Key Distribution Network

open access: yesApplied Sciences, 2023
Quantum key distribution (QKD) is an encrypted communication technique based on the principles of quantum mechanics that ensures communication security by exploiting the properties of quantum states.
Lin Bi, Minghui Miao, Xiaoqiang Di
doaj   +1 more source

Key-Locked Rank One Editing for Text-to-Image Personalization [PDF]

open access: yesInternational Conference on Computer Graphics and Interactive Techniques, 2023
Text-to-image models (T2I) offer a new level of flexibility by allowing users to guide the creative process through natural language. However, personalizing these models to align with user-provided visual concepts remains a challenging problem.
Yoad Tewel   +3 more
semanticscholar   +1 more source

Programmatic mapping and estimating the population size of female sex workers, men who have sex with men, people who inject drugs and transgender populations in Kenya [version 3; peer review: 2 approved, 1 approved with reservations]

open access: yesGates Open Research, 2023
Introduction Effective coverage of Human Immunodeficiency Virus prevention services for Key Populations (KPs) including female sex workers (FSWs), men who have sex with men (MSM), people who inject drugs (PWID) and transgender (TG) people necessitates ...
Faran Emmanuel   +11 more
doaj   +1 more source

Finite-key-size effect in a commercial plug-and-play QKD system [PDF]

open access: yes, 2016
A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted ...
Poompong Chaiwongkhot   +3 more
semanticscholar   +1 more source

Summarizing methods for estimating population size for key populations: a global scoping review for human immunodeficiency virus research

open access: yesAIDS Research and Therapy, 2022
Background Estimating the population sizes of key populations(people who inject drugs, men who have sex with men, transgender persons, and commercial sex workers) is critical for understanding the overall Human Immunodeficiency Virus burden. This scoping
Chen Xu   +9 more
doaj   +1 more source

Effects of Smartphone Size and Hand Size on Grip Posture in One-Handed Hard Key Operations

open access: yesApplied Sciences, 2020
Greater understanding of the grip postures preferred by users is needed for the ergonomic design of smartphone user interfaces. The present study identifies user-preferred grip postures by smartphone size and hand size in one-handed hard key operations ...
Younggeun Choi   +4 more
doaj   +1 more source

Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect

open access: yesEntropy, 2021
We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum state ...
Shengjie Xu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy