Showing 1 - 20 results of 120 for search '"cryptographer"', query time: 0.04s Refine Results
  1. 1

    Cryptographic Censorship by Netta Engelhardt, Åsmund Folkestad, Adam Levine, Evita Verheijden, Lisa Yang

    Published 2025-01-01
    “…Abstract We formulate and take two large strides towards proving a quantum version of the weak cosmic censorship conjecture. We first prove “Cryptographic Censorship”: a theorem showing that when the time evolution operator of a holographic CFT is approximately pseudorandom (or Haar random) on some code subspace, then there must be an event horizon in the corresponding bulk dual. …”
    Get full text
    Article
  2. 2

    INFORMATIVE DESCRIPTORS FOR STATISTICAL RECOGNITION OF CRYPTOGRAPHIC GENERATORS by Yu. S. Kharin, V. Yu. Palukha

    Published 2016-10-01
    “…An approach to developing informative descriptors for solving the problem of statistical recognition of cryptographic generators is proposed. The descriptors developed by this approach are given. …”
    Get full text
    Article
  3. 3
  4. 4

    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications by Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez, Doris Esenarro Vargas

    Published 2021-01-01
    “…This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. …”
    Get full text
    Article
  5. 5

    A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges by Donagani Ramakrishna, Mohammed Ali Shaik

    Published 2025-01-01
    “…Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. …”
    Get full text
    Article
  6. 6

    A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation by Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique

    Published 2022-01-01
    “…In this article, we proposed a novel technique to generate cryptographically strong S-box by using fractional transformation based on finite field. …”
    Get full text
    Article
  7. 7

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
    Get full text
    Article
  8. 8
  9. 9

    A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review by Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta

    Published 2024-01-01
    “…At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments.…”
    Get full text
    Article
  10. 10
  11. 11

    LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory by Fusheng Wu, Jinhui Liu, Yanbin Li, Mingtao Ni

    Published 2024-01-01
    “…The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks by Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci

    Published 2020-10-01
    “…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
    Get full text
    Article
  15. 15
  16. 16

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…QKD methods use quantum physics concepts to establish cryptographic keys, while quantum repeaters compensate for signal loss in fiber optic cables. …”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review” by Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta

    Published 2024-01-01
    “…Presents corrections to the paper, (Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”).…”
    Get full text
    Article
  20. 20