Results 91 to 100 of about 116,815 (231)

Intensity and State Estimation in Quantum Cryptography [PDF]

open access: yesarXiv, 2013
This paper describes how the communicating parties can employ intensity and state estimation to detect if the eavesdropper has siphoned off and injected photons in the received communication. This is of relevance in quantum cryptography based on random rotations of photon polarizations.
arxiv  

A Note on the Bellare-Rivest Protocol for Translucent Cryptography [PDF]

open access: yesarXiv, 2014
We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications.
arxiv  

Post-Quantum Cryptography [PDF]

open access: yesarXiv
In this survey we propose to cover the prose of post-quantum cryptography over classical cryptography. We talk about the various cryptographic methods that are being practiced to safeguard our information. The future of secure communication is expected to be the implementation of quantum-safe cryptographic systems, and that in the post-quantum era, the
arxiv  

Some application of difference equations in Cryptography and Coding Theory [PDF]

open access: yesarXiv, 2018
In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.
arxiv  

Hardware architectures for public key cryptography [PDF]

open access: green, 2003
Lejla Batina   +3 more
openalex   +1 more source

Problems in group theory motivated by cryptography [PDF]

open access: yesarXiv, 2018
This is a survey of algorithmic problems in group theory, old and new, motivated by applications to cryptography.
arxiv  

A new public key cryptography using generalized Fibonacci matrices [PDF]

open access: yesSurveys in Mathematics and its Applications
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal   +2 more
doaj  

Electronic Voting Protocol Using Identity-Based Cryptography

open access: yesThe Scientific World Journal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia   +1 more
doaj   +1 more source

Post Quantum Cryptography and its Comparison with Classical Cryptography [PDF]

open access: yesarXiv
Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions
arxiv  

Home - About - Disclaimer - Privacy