Results 31 to 40 of about 1,098,148 (248)

Research of collision properties of the modified UMAC algorithm on crypto-code constructions [PDF]

open access: yes, 2022
The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data.
Dmitriiev, Oleh   +6 more
core   +4 more sources

EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Internet ...
Sufyan T. Faraj
doaj   +1 more source

Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification

open access: yesMathematics, 2023
We propose a new high-speed secret key distillation system via public discussion based on the common randomness contained in the speech signal of the protocol participants.
Jelica Radomirović   +3 more
doaj   +1 more source

Hashing practice: analysis of hashing and universal hashing

open access: bronzeACM SIGMOD Record, 1988
Much of the literature on hashing deals with overflow handling (collision resolution) techniques and its analysis. What does all the analytical results mean in practice and how can they be achieved with practical files? This paper considers the problem of achieving analytical performance of hashing techniques in practice with reference to successful ...
M. Ramakrishna
openalex   +3 more sources

T‐depth reduction method for efficient SHA‐256 quantum circuit construction

open access: yesIET Information Security, Volume 17, Issue 1, Page 46-65, January 2023., 2023
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee   +3 more
wiley   +1 more source

Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange

open access: yesIET Information Security, Volume 17, Issue 1, Page 3-17, January 2023., 2023
Abstract Password‐authenticated key exchange (PAKE) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys.
Peixin Ren, Xiaozhuo Gu, Ziliang Wang
wiley   +1 more source

‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle

open access: yesThe Modern Law Review, Volume 86, Issue 1, Page 31-66, January 2023., 2023
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley   +1 more source

Exotic asphyxiation: interactions between invasive species and hypoxia

open access: yesBiological Reviews, Volume 98, Issue 1, Page 150-167, February 2023., 2023
ABSTRACT Non‐indigenous species (NIS) and hypoxia (<2 mg O2 l−1) can disturb and restructure aquatic communities. Both are heavily influenced by human activities and are intensifying with global change. As these disturbances increase, understanding how they interact to affect native species and systems is essential.
James E. Byers   +4 more
wiley   +1 more source

Non‐participation in smartphone data collection using research apps

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue S2, Page S225-S245, December 2022., 2022
Abstract Research apps allow to administer survey questions and passively collect smartphone data, thus providing rich information on individual and social behaviours. Agreeing to this novel form of data collection requires multiple consent steps, and little is known about the effect of non‐participation. We invited 4,293 Android smartphone owners from
Florian Keusch   +5 more
wiley   +1 more source

Designing small universal k-mer hitting sets for improved analysis of high-throughput sequencing. [PDF]

open access: yesPLoS Computational Biology, 2017
With the rapidly increasing volume of deep sequencing data, more efficient algorithms and data structures are needed. Minimizers are a central recent paradigm that has improved various sequence analysis tasks, including hashing for faster read overlap ...
Yaron Orenstein   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy