Y Furuta - Journal of High Energy Physics, 2022 - Springer
A bstract Recently, the construction of Narain CFT from a certain class of quantum error correcting codes has been discovered. In particular, the spectral gap of Narain CFT …
A Khompysh, N Kapalova, K Algazy… - Cogent …, 2022 - Taylor & Francis
This paper considers a new method for obtaining an S-box, which is one of the nonlinear transformations used in modern block-symmetric cipher systems. This method is based on …
ZX Nie, YZT Long, SL Zhang… - International Journal of …, 2022 - journals.sagepub.com
With the in-depth integration of traditional industries and information technology in Internet of things, wireless sensor networks are used more frequently to transmit the data generated …
SR Sihare - The European Physical Journal D, 2022 - Springer
For the generation of a hybrid secret key, hardly any quantum algorithms integrating computed qubits and decrypted bits have yet been developed. Integrating computed qubits …
The random numbers possess an essential role in cryptography as one can use them as keys, or to generate challenges, or even as IV values. One can generate random numbers …
Modern Big Data systems have shifted away from pure ETL solutions and towards real-time analysis of" raw text". Unsurprisingly, efficient analysis of raw text is a critical performance …
In real-time applications, authentication plays a vital role in enabling secure communications. The authentication protocols need to be formally verified under a defined …
This thesis presents how the blockchain technology is used in Internet-of-Things (IoT) applications. IoT is something present in our everyday life and the IoT applications rely on …