Improved straight-line extraction in the random oracle model with applications to signature aggregation

Y Kondi, A Shelat - International Conference on the Theory and …, 2022 - Springer
The goal of this paper is to improve the efficiency and applicability of straightline extraction
techniques in the random oracle model. Straightline extraction in the random oracle model …

Relation between spectra of Narain CFTs and properties of associated boolean functions

Y Furuta - Journal of High Energy Physics, 2022 - Springer
A bstract Recently, the construction of Narain CFT from a certain class of quantum error
correcting codes has been discovered. In particular, the spectral gap of Narain CFT …

Design of substitution nodes (S-Boxes) of a block cipher intended for preliminary encryption of confidential information

A Khompysh, N Kapalova, K Algazy… - Cogent …, 2022 - Taylor & Francis
This paper considers a new method for obtaining an S-box, which is one of the nonlinear
transformations used in modern block-symmetric cipher systems. This method is based on …

A controllable privacy data transmission mechanism for internet of things system based on blockchain

ZX Nie, YZT Long, SL Zhang… - International Journal of …, 2022 - journals.sagepub.com
With the in-depth integration of traditional industries and information technology in Internet of
things, wireless sensor networks are used more frequently to transmit the data generated …

Qubit and bit-based quantum hybrid secret key generation

SR Sihare - The European Physical Journal D, 2022 - Springer
For the generation of a hybrid secret key, hardly any quantum algorithms integrating
computed qubits and decrypted bits have yet been developed. Integrating computed qubits …

Evaluation with NIST Statistical Test on Pseudorandom Number Generators based on DMP-80 and DMP-128

BH Susanti, J Jimmy… - 2022 5th International …, 2022 - ieeexplore.ieee.org
The random numbers possess an essential role in cryptography as one can use them as
keys, or to generate challenges, or even as IV values. One can generate random numbers …

Xiao-Massey 定理: 历史背景, 学术影响和原创性

张卫国 - Journal of Cryptologic Research, 2022 - search.proquest.com
Abstract 1985 年, 肖国镇在第23 届ISIT 国际会议上提出非线性组合函数的" 线性统计独立"
的概念, 用频谱方法刻画了线性统计独立函数的特征. 线性统计独立与同一时期Siegenthaler …

Leveraging static dataflow in dynamically-compiled pipeline-parallel text-parsing programs using the Parabix framework

N Medforth - 2022 - summit.sfu.ca
Modern Big Data systems have shifted away from pure ETL solutions and towards real-time
analysis of" raw text". Unsurprisingly, efficient analysis of raw text is a critical performance …

Modelling Identity-Based Authentication and Key Exchange Protocol Using the Tamarin Prover

S Mookherji, V Odelu, R Prasath, AG Reddy… - … on Information Security …, 2022 - Springer
In real-time applications, authentication plays a vital role in enabling secure
communications. The authentication protocols need to be formally verified under a defined …

Security and efficiency of blockchain technologies applied to internet-of-things application

JP Abegg - 2022 - theses.hal.science
This thesis presents how the blockchain technology is used in Internet-of-Things (IoT)
applications. IoT is something present in our everyday life and the IoT applications rely on …