Results 71 to 80 of about 5,946 (156)
New Quantum Cryptanalysis of Binary Elliptic Curves
This paper improves upon the quantum circuits required for the Shor’s attack on binary elliptic curves. We present two types of quantum point addition, taking both qubit count and circuit depth into consideration.
Kyungbae Jang +4 more
doaj +1 more source
Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy +4 more
wiley +1 more source
A Novel Method of Data Protection Through DNA Chromosome Databases
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein +2 more
wiley +1 more source
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [
C. H. Bennett +7 more
core +1 more source
Complexity Engineering: How Subjective Issues Become Objective
This study details the substantial technological progress experienced in the last few decades, its impact on engineering, and how machine learning along with data science can contribute to solving human problems. The objective here is to establish the principles of “complexity engineering,” based on the works of Edgar Morin, and to demonstrate how ...
José Roberto C. Piqueira +3 more
wiley +1 more source
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu +4 more
wiley +1 more source
Improved Quantum Linear Attacks and Application to CAST
This paper studies quantum linear key-recovery attacks on block ciphers. The first such attacks were last-rounds attacks proposed by Kaplan et al. (ToSC 2016), which combine a linear distinguisher with a guess of a partial key.
Kaveh Bashiri +4 more
doaj +1 more source
Quantum Fourier sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems [PDF]
The Code Equivalence problem is that of determining whether two given linear codes are equivalent to each other up to a permutation of the coordinates.
Dinh, Hang +2 more
core
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
From quantum-codemaking to quantum code-breaking [PDF]
This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum ...
Ekert, Artur
core +1 more source

