About 745 results
Open links in new tab
  1. noticeable fraction of today’s Internet communication—Alice and Bob need to perform some computation and send some data but do not need any new hardware. Quantum cryptography …

  2. Feb 6, 2023 · Cryptography for Trusted Platform TS 33.117: "the network product shall support software package integrity validation via cryptographic means", e.g. digital signature.

  3. Jan 14, 2025 · Protocols such as IPsec, IKE, TLS, HTTP, SMTP and others are ubiquitous internet or application level protocols used to secure a host of modern communications applications …

  4. Multivariate-quadratic-equations public-key cryptography

    Applied cryptography and network security, 4th international conference, ACNS 2006, Singapore, June 6-9, 2006, proceedings. Lecture Notes in Computer Science 3989.

  5. Mar 10, 2025 · The Authorization Network virtually connects the authentication and authorization systems and identity verification sources of participating organizations and neutral service …

  6. Hash-based public-key cryptography

    Applied Cryptography and Network Security, 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007, proceedings. Lecture Notes in Computer Science 4521.

  7. Apr 16, 2025 · We propose quantum measurement enabled (classical/quantum) networks that do not require amplification by leveraging quantum receiver technology and we propose to build a …

  8. Jan 5, 2023 · Pervasive network connection and information flow Security must be the first consideration Security proof adds confidence but should not be the solely considered criteria …

  9. Aug 27, 2024 · Merkle tree. This can increase throughput. In addition, 2nd layer solutions (like the Lightning Network) can create a network of payment channels that can trustlessly exchange …

  10. Feb 11, 2025 · Authentication, integrity protection, and confidentiality protection across a private network for keys used in information exchange including both IT (e.g., financial systems) and …