Hasil untuk "cs.CR"

Menampilkan 20 dari ~197910 hasil · dari DOAJ, arXiv, CrossRef

JSON API
arXiv Open Access 2025
Software Unclonable Functions for IoT Devices Identification and Security

Saeed Alshehhi

In the evolving landscape of IoT ecosystem, distinguishing between legitimate and compromised devices is a critical challenge. This research investigates the effectiveness of hardware performance counter (HPC)-derived signatures' uniqueness under the umbrella of a concept that we introduced as software unclonable functions (SUFs).

en cs.CR
arXiv Open Access 2019
Genus 2 Supersingular Isogeny Oblivious Transfer

Ramsès Fernàndez-València

We present an oblivious transfer scheme that extends the proposal made by Barreto, Oliveira and Benits, based in isogenies supersingular elliptic curves, to the setting of principally polarized supersingular abelian surfaces.

en cs.CR, math.AG
arXiv Open Access 2017
On Some Properties of Quadratic APN Functions of a Special Form

Irene Villa

In a recent paper, it is shown that functions of the form $L_1(x^3)+L_2(x^9)$, where $L_1$ and $L_2$ are linear, are a good source for construction of new infinite families of APN functions. In the present work we study necessary and sufficient conditions for such functions to be APN.

en cs.CR
arXiv Open Access 2012
Non-commutative Digital Signatures

Delaram Kahrobaei, Charalambos Koupparis

The objective of this work is to survey several digital signatures proposed in the last decade using non-commutative groups and rings and propose a digital signature using non-commutative groups and analyze its security.

en cs.CR, math.GR
arXiv Open Access 2011
New Results on Scrambling Using the Mesh Array

Sandhya Rangineni

This paper presents new results on randomization using Kak's Mesh Array for matrix multiplication. These results include the periods of the longest cycles when the the array is used for scrambling and the autocorrelation function of the binary sequence obtained from the cycles.

en cs.CR
arXiv Open Access 2008
A new key exchange cryptosystem

An-Ping Li

In this paper, we will present a new key exchange cryptosystem based on linear algebra, which take less operations but weaker in security than Diffie-Hellman's one.

en cs.CR
arXiv Open Access 2007
Testing D-Sequences for their Randomness

Sumanth Kumar Reddy Gangasani

This paper examines the randomness of d-sequences, which are decimal sequences to an arbitrary base. Our motivation is to check their suitability for application to cryptography, spread-spectrum systems and use as pseudorandom sequence.

en cs.CR
arXiv Open Access 2004
An unbreakable cryptosystem

Arindam Mitra

The remarkably long-standing problem of cryptography is to generate completely secure key. It is widely believed that the task cannot be achieved within classical cryptography. However, there is no proof in support of this belief. We present an incredibly simple classical cryptosystem which can generate completely secure key.

en cs.CR
arXiv Open Access 2006
Trusted Certificates in Quantum Cryptography

William Perkins

This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

en cs.CR
arXiv Open Access 2003
Hidden Polynomial(s) Cryptosystems

Ilia Toli

We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.

en cs.CR, cs.SC

Halaman 3 dari 9896