Research of collision properties of the modified UMAC algorithm on crypto-code constructions [PDF]
The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data.
Dmitriiev, Oleh+6 more
core +4 more sources
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY [PDF]
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Internet ...
Sufyan T. Faraj
doaj +1 more source
Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification
We propose a new high-speed secret key distillation system via public discussion based on the common randomness contained in the speech signal of the protocol participants.
Jelica Radomirović+3 more
doaj +1 more source
Hashing practice: analysis of hashing and universal hashing
Much of the literature on hashing deals with overflow handling (collision resolution) techniques and its analysis. What does all the analytical results mean in practice and how can they be achieved with practical files? This paper considers the problem of achieving analytical performance of hashing techniques in practice with reference to successful ...
M. Ramakrishna
openalex +3 more sources
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee+3 more
wiley +1 more source
Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange
Abstract Password‐authenticated key exchange (PAKE) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys.
Peixin Ren, Xiaozhuo Gu, Ziliang Wang
wiley +1 more source
‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley +1 more source
Exotic asphyxiation: interactions between invasive species and hypoxia
ABSTRACT Non‐indigenous species (NIS) and hypoxia (<2 mg O2 l−1) can disturb and restructure aquatic communities. Both are heavily influenced by human activities and are intensifying with global change. As these disturbances increase, understanding how they interact to affect native species and systems is essential.
James E. Byers+4 more
wiley +1 more source
Non‐participation in smartphone data collection using research apps
Abstract Research apps allow to administer survey questions and passively collect smartphone data, thus providing rich information on individual and social behaviours. Agreeing to this novel form of data collection requires multiple consent steps, and little is known about the effect of non‐participation. We invited 4,293 Android smartphone owners from
Florian Keusch+5 more
wiley +1 more source
Designing small universal k-mer hitting sets for improved analysis of high-throughput sequencing. [PDF]
With the rapidly increasing volume of deep sequencing data, more efficient algorithms and data structures are needed. Minimizers are a central recent paradigm that has improved various sequence analysis tasks, including hashing for faster read overlap ...
Yaron Orenstein+4 more
doaj +1 more source