Results 91 to 100 of about 116,815 (231)
Intensity and State Estimation in Quantum Cryptography [PDF]
This paper describes how the communicating parties can employ intensity and state estimation to detect if the eavesdropper has siphoned off and injected photons in the received communication. This is of relevance in quantum cryptography based on random rotations of photon polarizations.
arxiv
A Note on the Bellare-Rivest Protocol for Translucent Cryptography [PDF]
We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications.
arxiv
Post-Quantum Cryptography [PDF]
In this survey we propose to cover the prose of post-quantum cryptography over classical cryptography. We talk about the various cryptographic methods that are being practiced to safeguard our information. The future of secure communication is expected to be the implementation of quantum-safe cryptographic systems, and that in the post-quantum era, the
arxiv
Some application of difference equations in Cryptography and Coding Theory [PDF]
In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.
arxiv
Hardware architectures for public key cryptography [PDF]
Lejla Batina+3 more
openalex +1 more source
Problems in group theory motivated by cryptography [PDF]
This is a survey of algorithmic problems in group theory, old and new, motivated by applications to cryptography.
arxiv
A SECURE CHANNEL PROTOCOL FOR MULTI-APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY [PDF]
Konstantinos Markantonakis, Keith Mayes
openalex +1 more source
A new public key cryptography using generalized Fibonacci matrices [PDF]
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal+2 more
doaj
Electronic Voting Protocol Using Identity-Based Cryptography
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia+1 more
doaj +1 more source
Post Quantum Cryptography and its Comparison with Classical Cryptography [PDF]
Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions
arxiv