keyword
MENU ▼
Read by QxMD icon Read
search

Cryptography

keyword
https://www.readbyqxmd.com/read/30119408/eavesdropping-and-countermeasures-for-backflash-side-channel-in-quantum-cryptography
#1
Paulo Vinicius Pereira Pinheiro, Poompong Chaiwongkhot, Shihan Sajeed, Rolf T Horn, Jean-Philippe Bourgoin, Thomas Jennewein, Norbert Lütkenhaus, Vadim Makarov
Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the receiver unit. Here we investigate the information leakage from a QKD receiver due to photon emission caused by detection events in single-photon detectors (backflash). We test commercial silicon avalanche photodiodes and a photomultiplier tube, and find that the former emit backflashes...
August 6, 2018: Optics Express
https://www.readbyqxmd.com/read/30110744/using-a-reservoir-computer-to-learn-chaotic-attractors-with-applications-to-chaos-synchronization-and-cryptography
#2
Piotr Antonik, Marvyn Gulina, Jaël Pauwels, Serge Massar
Using the machine learning approach known as reservoir computing, it is possible to train one dynamical system to emulate another. We show that such trained reservoir computers reproduce the properties of the attractor of the chaotic system sufficiently well to exhibit chaos synchronization. That is, the trained reservoir computer, weakly driven by the chaotic system, will synchronize with the chaotic system. Conversely, the chaotic system, weakly driven by a trained reservoir computer, will synchronize with the reservoir computer...
July 2018: Physical Review. E
https://www.readbyqxmd.com/read/30110420/committing-to-quantum-resistance-a-slow-defence-for-bitcoin-against-a-fast-quantum-computing-attack
#3
I Stewart, D Ilie, A Zamyatin, S Werner, M F Torshizi, W J Knottenbelt
Quantum computers are expected to have a dramatic impact on numerous fields due to their anticipated ability to solve classes of mathematical problems much more efficiently than their classical counterparts. This particularly applies to domains involving integer factorization and discrete logarithms, such as public key cryptography. In this paper, we consider the threats a quantum-capable adversary could impose on Bitcoin, which currently uses the Elliptic Curve Digital Signature Algorithm (ECDSA) to sign transactions...
June 2018: Royal Society Open Science
https://www.readbyqxmd.com/read/30073589/trends-to-store-digital-data-in-dna-an-overview
#4
REVIEW
Fatima Akram, Ikram Ul Haq, Haider Ali, Aiman Tahir Laghari
There has been an ascending growth in the capacity of information being generated. The increased production of data in turn has put forward other challenges as well thus, and there is the need to store this information and not only to store it but also to retain it for a prolonged time period. The reliance on DNA as a dense storage medium with high storage capacity and its ability to withstand extreme environmental conditions has increased over the past few years. There have been developments in reading and writing different forms of data on DNA, codes for encrypting data and using DNA as a way of secret writing leading towards new styles like stenography and cryptography...
August 2, 2018: Molecular Biology Reports
https://www.readbyqxmd.com/read/30059325/towards-genetic-cryptography-for-biomedical-wireless-sensor-networks-gateways
#5
Zoubir Hamici
The integration of wireless sensor networks into Internet of things, led to a new generation of sensor nodes, directly connected to remote servers, for signal processing and decision making. The migration of data processing from local node, achieved by decoupling the node hardware from the required processing capabilities, is only possible through implementations of network virtualization. The virtualization which brings, new services that are executed remotely has led to security challenges, yet to be resolved, due to the increasing amount of data being continually exchanged between the sensor node-hub and remote servers...
July 30, 2018: IEEE Journal of Biomedical and Health Informatics
https://www.readbyqxmd.com/read/30047789/how-to-use-blockchain-for-diabetes-health-care-data-and-access-management-an-operational-concept
#6
Simon Lebech Cichosz, Mads Nibe Stausholm, Thomas Kronborg, Peter Vestergaard, Ole Hejlesen
INTRODUCTION: Patients with diabetes often generate large amounts of data specifically related to the disease and to their general health. Cross-institutional sharing of patient health care data is complex, and as a consequence, data are not always available to the health care provider treating the patient. Accommodating this challenge could lead to better clinical effectiveness and improve clinical research. This work aims to present an approach for a blockchain-based platform for sharing health care data...
July 26, 2018: Journal of Diabetes Science and Technology
https://www.readbyqxmd.com/read/30041475/a-multi-server-two-factor-authentication-scheme-with-un-traceability-using-elliptic-curve-cryptography
#7
Guosheng Xu, Shuming Qiu, Haseeb Ahmad, Guoai Xu, Yanhui Guo, Miao Zhang, Hong Xu
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in multi-server environments, Internet of Things (IoT), wireless sensor networks (WSNs), etc. This scheme enables users and servers to negotiate for a common session initiation key. Our proposal first analyzes Amin et al.'s authentication scheme based on RSA and proves that it cannot provide perfect forward secrecy and user un-traceability, and is susceptible to offline password guessing attack and key-compromise user impersonation attack...
July 23, 2018: Sensors
https://www.readbyqxmd.com/read/30040668/design-of-highly-nonlinear-substitution-boxes-based-on-i-ching-operators
#8
Tong Zhang, C L Philip Chen, Long Chen, Xiangmin Xu, Bin Hu
This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators (ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators- intrication, turnover, and mutual- inherited from I-Ching are specifically designed to generate S-Boxes in cryptography. In order to analyze these three operators, identity, compositionality, and periodicity measures are developed. All three operators are only applied to change the output positions of Boolean functions. Therefore, the bijection property of S-Box is satisfied automatically...
July 23, 2018: IEEE Transactions on Cybernetics
https://www.readbyqxmd.com/read/30022440/opportunities-for-use-of-blockchain-technology-in-medicine
#9
Igor Radanović, Robert Likić
Blockchain technology is a decentralized database that stores a registry of assets and transactions across a peer-to-peer computer network, which is secured through cryptography, and over time, its history gets locked in blocks of data that are cryptographically linked together and secured. So far, there have been use cases of this technology for cryptocurrencies, digital contracts, financial and public records, and property ownership. It is expected that future uses will expand into medicine, science, education, intellectual property, and supply chain management...
July 18, 2018: Applied Health Economics and Health Policy
https://www.readbyqxmd.com/read/30013123/a-wavelength-convertible-quantum-memory-controlled-echo
#10
Byoung S Ham
Quantum coherence control is reinvestigated for a new physical insight in quantum nonlinear optics and applied for a wavelength-convertible quantum memory in a solid ensemble whose spin states are inhomogeneously broadened. Unlike typical atomic media whose spin decays are homogeneous, a spin inhomogeneously broadened solid ensemble requires a counter-intuitive quantum coherence control to avoid spontaneous emission-caused quantum noises. Such a quantum coherence control in a solid ensemble satisfying both near perfect retrieval efficiency and ultralong photon storage offers a solid framework to quantum repeaters, scalable qubit generations, quantum cryptography, and highly sensitive magnetometry...
July 16, 2018: Scientific Reports
https://www.readbyqxmd.com/read/30004524/experimental-three-party-quantum-random-number-generator-based-on-dimension-witness-violation-and-weak-measurement
#11
Xue-Bi An, Hong-Wei Li, Zhen-Qiang Yin, Meng-Jun Hu, Wei Huang, Bing-Jie Xu, Shuang Wang, Wei Chen, Guang-Can Guo, Zheng-Fu Han
Random number generation is an important task in modern science. A variety of quantum random number generation protocols have been proposed and realized. These protocols, however, are all based on two parties. Based on the weak measurement technique, we propose and realize a quantum random number generator among three observers. The violation of a double classical dimension witness based on the determinant value is first observed in experiment. With the heralding single-photon source, our experimental setup attains the independent assumption and the dimension assumption, which means our setup is semi-device-independent (DI)...
July 15, 2018: Optics Letters
https://www.readbyqxmd.com/read/29993830/paxel-a-generic-framework-to-superimpose-high-frequency-print-patterns-using-projected-light
#12
Petar Pjanic, Anselm Grundhofer
In this paper, we propose Paxel, a generic framework for modeling the interaction between a projector and a high-frequency pattern surface. Using this framework, we present two different application setups (cf. Fig. 1a): a novel colorchanging effect, created with a single projected image and only when the projection surface is changed from a pattern surface to a uniform white surface. The observed effect relies on the spatially different reflectance properties of these two surfaces. Using this approach, one can alter color proprieties of the projected image such as hue or chroma...
April 6, 2018: IEEE Transactions on Image Processing: a Publication of the IEEE Signal Processing Society
https://www.readbyqxmd.com/read/29951089/combining-cryptography-with-eeg-biometrics
#13
Robertas Damaševičius, Rytis Maskeliūnas, Egidijus Kazanavičius, Marcin Woźniak
Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics...
2018: Computational Intelligence and Neuroscience
https://www.readbyqxmd.com/read/29931655/medblock-efficient-and-secure-medical-data-sharing-via-blockchain
#14
Kai Fan, Shangyang Wang, Yanhui Ren, Hui Li, Yintang Yang
With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients' data in hospitals. They are stored in different hospitals' databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies...
June 21, 2018: Journal of Medical Systems
https://www.readbyqxmd.com/read/29915427/carbon-nanotubes-as-emerging-quantum-light-sources
#15
REVIEW
X He, H Htoon, S K Doorn, W H P Pernice, F Pyatkov, R Krupke, A Jeantet, Y Chassagneux, C Voisin
Progress in quantum computing and quantum cryptography requires efficient, electrically triggered, single-photon sources at room temperature in the telecom wavelengths. It has been long known that semiconducting single-wall carbon nanotubes (SWCNTs) display strong excitonic binding and emit light over a broad range of wavelengths, but their use has been hampered by a low quantum yield and a high sensitivity to spectral diffusion and blinking. In this Perspective, we discuss recent advances in the mastering of SWCNT optical properties by chemistry, electrical contacting and resonator coupling towards advancing their use as quantum light sources...
June 18, 2018: Nature Materials
https://www.readbyqxmd.com/read/29904937/synergistic-information-processing-encrypts-strategic-reasoning-in-poker
#16
Seth Frey, Dominic K Albino, Paul L Williams
There is a tendency in decision-making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and predict his or her behavior...
June 14, 2018: Cognitive Science
https://www.readbyqxmd.com/read/29890704/an-enhanced-lorawan-security-protocol-for-privacy-preservation-in-iot-with-a-case-study-on-a-smart-factory-enabled-parking-system
#17
Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, Jung Taek Seo
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways...
June 8, 2018: Sensors
https://www.readbyqxmd.com/read/29783791/controller%C3%A2-pilot-data-link-communication-security
#18
Andrei Gurtov, Tatiana Polishchuk, Max Wernberg
The increased utilization of the new types of cockpit communications, including controller⁻pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM)...
May 20, 2018: Sensors
https://www.readbyqxmd.com/read/29762566/parallel-sorting-of-orbital-and-spin-angular-momenta-of-light-in-a-record-large-number-of-channels
#19
Gary F Walsh, Luciano De Sio, David E Roberts, Nelson Tabiryan, Francisco J Aranda, Brian R Kimball
Parallel sorting of orbital and spin angular momentum components of structured optical beams is demonstrated. Both spin channels are multiplexed within the novel orbital angular momentum (OAM) sorter, reducing the size, weight, and number of elements. The sorted states are linearly spaced over 70 topological charge values. We experimentally and theoretically evaluate the operational range and crosstalk between neighboring channels and find that 30 orbital angular momentum states are available per spin channel for quantum communication or cryptography...
May 15, 2018: Optics Letters
https://www.readbyqxmd.com/read/29762511/pcpa-a-practical-certificateless-conditional-privacy-preserving-authentication-scheme-for-vehicular-ad-hoc-networks
#20
Yang Ming, Xiaoqin Shen
Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important to deal with the security and privacy problems for VANETs. In this paper, based on certificateless cryptography and elliptic curve cryptography, we present a certificateless signature with message recovery (CLS-MR), which we believe are of independent interest. Then, a practical certificateless conditional privacy preserving authentication (PCPA) scheme is proposed by incorporating the proposed CLS-MR scheme...
May 15, 2018: Sensors
keyword
keyword
168420
1
2
Fetch more papers »
Fetching more papers... Fetching...
Read by QxMD. Sign in or create an account to discover new knowledge that matter to you.
Remove bar
Read by QxMD icon Read
×

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"