Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Arapinis, Myrto"'
Simultaneous broadcast (SBC) protocols [Chor et al., FOCS 1985] constitute a special class of broadcast channels which have proved extremely useful in the design of various distributed computing constructions (e.g., multiparty computation, coin flipp
Externí odkaz:
http://arxiv.org/abs/2305.06468
Publikováno v:
Quantum 7, 1014 (2023)
Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We
Externí odkaz:
http://arxiv.org/abs/2110.09469
We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing the classical concept of a secure enclave which isolates a
Externí odkaz:
http://arxiv.org/abs/2109.02952
In this paper, we continue the line of work initiated by Boneh and Zhandry at CRYPTO 2013 and EUROCRYPT 2013 in which they formally define the notion of unforgeability against quantum adversaries specifically, for classical message authentication cod
Externí odkaz:
http://arxiv.org/abs/2103.13994
Publikováno v:
Quantum 5, 475 (2021)
A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in
Externí odkaz:
http://arxiv.org/abs/1910.02126
Publikováno v:
ACM Transactions on Quantum Computing 2, 1, Article 4 (2021)
Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist "quantum attacks". In particular,
Externí odkaz:
http://arxiv.org/abs/1810.05083
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techn
Externí odkaz:
http://arxiv.org/abs/1407.5444
Publikováno v:
Logical Methods in Computer Science, Volume 10, Issue 2 (June 19, 2014) lmcs:690
The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which y
Externí odkaz:
http://arxiv.org/abs/1405.2738
The ubiquitous presence of mobile communication devices and the continuous development of mo- bile data applications, which results in high level of mobile devices' activity and exchanged data, often transparent to the user, makes privacy preservatio
Externí odkaz:
http://arxiv.org/abs/1109.2066
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.