Blockchain empowered arbitrable data auditing scheme for network storage as a service

Y Xu, J Ren, Y Zhang, C Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The maturity of network storage technology drives users to outsource local data to remote
servers. Since these servers are not reliable enough for keeping users' data, remote data …

Quantum generators of random numbers

MM Jacak, P Jóźwiak, J Niemczuk, JE Jacak - Scientific Reports, 2021 - nature.com
Generation of random numbers is a central problem for many applications in the field of
information processing, including, eg, cryptography, in classical and quantum regime, but …

Batch verification of digital signatures: approaches and challenges

AS Kittur, AR Pais - Journal of information security and applications, 2017 - Elsevier
Digital Signatures can be considered analogous to an ordinary handwritten signature for
signing messages in the Digital world. Digital signature must be unique and exclusive for …

Event-based fixed-time synchronization of neural networks under DoS attack and its applications

M Xing, J Lu, J Lou, L Zhang - Neural Networks, 2023 - Elsevier
In this paper, the fixed-time synchronization control for neural networks with discontinuous
data communication is investigated. Due to the transmission blocking caused by DoS attack …

[PDF][PDF] A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves.

BP Kavin, S Ganapathy - Int. Arab J. Inf. Technol., 2021 - ccis2k.org
In this paper, we propose an Enhanced Digital Signature Algorithm (EDSA) for verifying the
data integrity while storing the data in cloud database. The proposed EDSA is developed by …

Accelerated key generation and distribution using polarization scrambling in optical fiber

AAE Hajomer, L Zhang, X Yang, W Hu - Optics Express, 2019 - opg.optica.org
The physical-layer properties of the classical optical fiber channel provide an inherent,
unique, random and reciprocal source for secure key generation and distribution (SKGD) …

[PDF][PDF] Multi-bit quantum random number generator from path-entangled single photons

KM Shafi, P Chawla, AS Hegde, RS Gayatri… - EPJ Quantum …, 2023 - Springer
Measurement outcomes on quantum systems exhibit inherent randomness and are
fundamentally nondeterministic. This has enabled quantum physics to set new standards for …

Эллиптические кривые в форме Эдвардса и криптография

АВ Бессалов - 2017 - elibrary.kubg.edu.ua
Исследованы свойства нового класса эллиптических кривых в форме Эдвардса,
которые полезны для решения задач асимметричной криптографии. Обоснована …

[HTML][HTML] Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II

O Hirota, M Sohma - Entropy, 2024 - pmc.ncbi.nlm.nih.gov
This paper discusses the foundation of security theory for the Quantum stream cipher based
on the Holevo–Yuen theory, which allows the use of “optical amplifiers”. This type of cipher …

[图书][B] Information-theoretic Cryptography

H Tyagi, S Watanabe - 2023 - books.google.com
This book offers a mathematical foundation for modern cryptography. It is primarily intended
as an introduction for graduate students. Readers should have basic knowledge of …