Filters








1,819 Hits in 5.2 sec

Approximating Imperfect Cryptography in a Formal Model

Angelo Troina, Alessandro Aldini, Roberto Gorrieri
<span title="">2004</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uy5mv2ncw5eahkdx47hkrglxmm" style="color: black;">Electronical Notes in Theoretical Computer Science</a> </i> &nbsp;
We present a formal view of cryptography that overcomes the usual assumptions of formal models for reasoning about security of computer systems, i.e. perfect cryptography and Dolev-Yao adversary model.  ...  In our framework, equivalence among formal cryptographic expressions is parameterized by a computational adversary that may exploit weaknesses of the cryptosystem to cryptanalyze ciphertext with a certain  ...  Moreover, similarly as the soundness result shown in [1] , it turns out that if p dec is a negligible function, i.e. the encryption scheme is ideal, equivalence in a formal setting stating perfect cryptography  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2004.02.008">doi:10.1016/j.entcs.2004.02.008</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hocbsrzffjfgzn3gvma35a5wzu">fatcat:hocbsrzffjfgzn3gvma35a5wzu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170929003706/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/700/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTU3MTA2NjEwNDA1MDY2Mg%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/77/dc77f1fd645a8555a7e1f582d42aeda4dd3f0751.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2004.02.008"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Quantum cryptography beyond quantum key distribution

Anne Broadbent, Christian Schaffner
<span title="2015-12-21">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c45m6ttnaje4xbjsq7m2c6df2a" style="color: black;">Designs, Codes and Cryptography</a> </i> &nbsp;
Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks.  ...  of quantum security models for classical primitives.  ...  Acknowledgments It is a pleasure to acknowledge conversations with Gilles Brassard, Gus Gutoski, Serge Fehr and Louis Salvail in the preparation of this document.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-015-0157-4">doi:10.1007/s10623-015-0157-4</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32226229">pmid:32226229</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7089691/">pmcid:PMC7089691</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zm7zdq4l6babtd4y5ygwmttt2q">fatcat:zm7zdq4l6babtd4y5ygwmttt2q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171014141828/http://publisher-connector.core.ac.uk/resourcesync/data/Springer-OA/pdf/758/aHR0cDovL2xpbmsuc3ByaW5nZXIuY29tLzEwLjEwMDcvczEwNjIzLTAxNS0wMTU3LTQucGRm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9e/d1/9ed1f01d581a82c3aa35171e5f853b35f96f790d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-015-0157-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7089691" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Towards a Formal Treatment of Secrecy Against Computational Adversaries [chapter]

Angelo Troina, Alessandro Aldini, Roberto Gorrieri
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
To relate these two different models of cryptography, in this paper we enrich a formal model for cryptographic expressions, originally based on the Dolev-Yao assumptions, with computational aspects based  ...  Polynomial time adversaries based on a computational view of cryptography have additional capabilities that the classical Dolev-Yao adversary model does not include.  ...  an imperfect cryptography scenario.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-31794-4_5">doi:10.1007/978-3-540-31794-4_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/osdun4qkqvfvxbminx2farmcwa">fatcat:osdun4qkqvfvxbminx2farmcwa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401152422/http://www.sti.uniurb.it/aldini/publications/lncsGC2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/c7/c0c74fd04b433ab78a44c88009a9fa4e46f16bbf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-31794-4_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

Mariano Lemus, Mariana F. Ramos, Preeti Yadav, Nuno A. Silva, Nelson J. Muga, André Souto, Nikola Paunković, Paulo Mateus, Armando N. Pinto
<span title="2020-06-12">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation.  ...  We analyse the security and efficiency features of the technique and conclude that it presents advantages in both areas when compared to public-key based techniques.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app10124080">doi:10.3390/app10124080</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5skqgy2jqzf3ndtdeurk7deypm">fatcat:5skqgy2jqzf3ndtdeurk7deypm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200616041353/https://res.mdpi.com/d_attachment/applsci/applsci-10-04080/article_deploy/applsci-10-04080-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/6f/666fc06f2db2a45bde4de41d5cbc96057f5c5f2f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app10124080"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
<span title="2022-05-27">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
., physical-layer security and cryptography schemes.  ...  On the other hand, cybersecurity techniques and solutions applied in SATCOM links should be updated to reflect the enormous advancements in attacker capabilities characterizing the last two decades.  ...  approximate radius of 580 km.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.11324v3">arXiv:2112.11324v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jhzalhfnt5gppbetfdzy35fxrq">fatcat:jhzalhfnt5gppbetfdzy35fxrq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220531043208/https://arxiv.org/pdf/2112.11324v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/fa/08fad7b8eca3ec55170c9d384eabfce2821d256b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.11324v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design

Davide Bellizia, Nadia El Mrabet, Apostolos P. Fournaris, Simon Pontie, Francesco Regazzoni, Francois-Xavier Standaert, Elise Tasso, Emanuele Valea
<span title="2021-10-06">2021</span> <i title="IEEE"> 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) </i> &nbsp;
In this paper, we introduce the fundamentals of PQC, with a focus on lattice-based cryptography and its hardware security issues, namely side-channel and fault-based attacks.  ...  We argue that this characteristic is a clear opportunity that paves the way for the application of approximate (or inexact) computing to the implementation of PQC cryptography.  ...  In [33] the authors provide a theoretical modelling of the side-channel information that can leak from LWE based crypto algorithms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/dft52944.2021.9568301">doi:10.1109/dft52944.2021.9568301</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n5dg4bfffvhh7msczlqcel7wiq">fatcat:n5dg4bfffvhh7msczlqcel7wiq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220414133945/https://hal-cea.archives-ouvertes.fr/cea-03452245/file/DFTS2021_SpecialSession_PQC.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9b/a2/9ba284e5830992cc1a8263613557c420a58e197d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/dft52944.2021.9568301"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Gaming security by obscurity

Dusko Pavlovic
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/osnbukkdqjedvkk44xndonptme" style="color: black;">Proceedings of the 2011 workshop on New security paradigms workshop - NSPW &#39;11</a> </i> &nbsp;
This view is still endorsed in cryptography.  ...  This idea became one of the greatest new paradigms in computer science, and led to modern cryptography.  ...  Modern cryptography is based on accepting such risks. Approximate logical specifications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2073276.2073289">doi:10.1145/2073276.2073289</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/nspw/Pavlovic11.html">dblp:conf/nspw/Pavlovic11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ouy36csmcnc3bfxsrooagjdqsm">fatcat:ouy36csmcnc3bfxsrooagjdqsm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809211728/https://dl.packetstormsecurity.net/papers/general/1109.5542v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/84/c084c6d17be84e35f973ea8e17a483549c36720f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2073276.2073289"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Using quantum key distribution for cryptographic purposes: a survey [article]

Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev (+9 others)
<span title="2014-12-04">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications  ...  We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point  ...  A. thanks Gilles Van Assche for his help on improving subsection 3.3. R.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/quant-ph/0701168v3">arXiv:quant-ph/0701168v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j3wuwqjuarav3ft6chdvdsaw5a">fatcat:j3wuwqjuarav3ft6chdvdsaw5a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191019191130/https://arxiv.org/pdf/quant-ph/0701168v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/43/4b43643b8d46965f2d9ba4a283b9ac6b949cd7ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/quant-ph/0701168v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Gaming security by obscurity [article]

Dusko Pavlovic
<span title="2012-09-16">2012</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This view is still endorsed in cryptography.  ...  This idea became one of the greatest new paradigms in computer science, and led to modern cryptography.  ...  A sketch of a formal model of security games of incomplete information, and of the game of attack vectors, is given in Appendix A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1109.5542v4">arXiv:1109.5542v4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i5k7csvk5jbsna7yy3f77r3734">fatcat:i5k7csvk5jbsna7yy3f77r3734</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722154826/https://ris.utwente.nl/ws/files/5457973/1109.5542v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/14/bd/14bd51b0e50a925af7ab35b1fb2417f0034ea467.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1109.5542v4" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cryptography in a Quantum World [article]

Gilles Brassard
<span title="2015-10-14">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation.  ...  Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out!  ...  Introduction For thousands of years, cryptography has been an ongoing battle between codemakers and codebreakers [1, 2] , who are more formally called cryptographers and cryptanalysts.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1510.04256v1">arXiv:1510.04256v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vbalvrubfng2pk4lj57zkfcnzm">fatcat:vbalvrubfng2pk4lj57zkfcnzm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200908014450/https://arxiv.org/pdf/1510.04256v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/06/d7/06d799aef6305d9da04762c36e216c6d67ac3d77.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1510.04256v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

No better ways to generate hard NP instances than picking uniformly at random

R. Impagliazzo, L.A, Levin
<span title="">1990</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v4uclqixrrhlnk5pbw4wii6cfq" style="color: black;">Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science</a> </i> &nbsp;
A number of papers show completeness of several natural DNP problems in the class of aJl DNP problems with P-time computable distributions.  ...  Reductions between such problems must approximately preserve the distributions.  ...  In the formal definition of randomized reduction between DNP problems, we separate the randomized reduction into a randomizing step, followed by a deterministic reduction.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/fscs.1990.89604">doi:10.1109/fscs.1990.89604</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/focs/ImpagliazzoL90.html">dblp:conf/focs/ImpagliazzoL90</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fhjkeb3rinantk2ngpncpxohzi">fatcat:fhjkeb3rinantk2ngpncpxohzi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190224074521/http://pdfs.semanticscholar.org/54d9/05693536363d0b347afbe1bdb05fb23e0f69.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/54/d9/54d905693536363d0b347afbe1bdb05fb23e0f69.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/fscs.1990.89604"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Practical position-based quantum cryptography

Kaushik Chakraborty, Anthony Leverrier
<span title="2015-11-05">2015</span> <i title="American Physical Society (APS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/iedolmzeofgc3ezyedga7h4eba" style="color: black;">Physical Review A. Atomic, Molecular, and Optical Physics</a> </i> &nbsp;
a complexity exponential in the number of classical bits transmitted.  ...  We study a general family of quantum protocols for position verification and present a new class of attacks based on the Clifford hierarchy.  ...  Acknowledgments We thank André Chailloux, Frédéric Grosshans and Christian Schaffner for many stimulating discussions on position-based cryptography.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1103/physreva.92.052304">doi:10.1103/physreva.92.052304</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qahz3frchjbx7jqhzl53gpvdli">fatcat:qahz3frchjbx7jqhzl53gpvdli</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200914044842/https://arxiv.org/pdf/1507.00626v2.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/38/ff38fdb3c9f7a52226996e5f8bd22122def3fa37.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1103/physreva.92.052304"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> aps.org </button> </a>

Using a reservoir computer to learn chaotic attractors, with applications to chaos synchronization and cryptography

Piotr Antonik, Marvyn Gulina, Jaël Pauwels, Serge Massar
<span title="2018-07-24">2018</span> <i title="American Physical Society (APS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5pgnwkvlevhybgsbuc3q7fchx4" style="color: black;">Physical review. E</a> </i> &nbsp;
We then show that trained reservoir computers can be used to crack chaos based cryptography and illustrate this on a chaos cryptosystem based on the Mackey-Glass system.  ...  Conversely, the chaotic system, weakly driven by a trained reservoir computer, will synchronise with the reservoir computer. We illustrate this behaviour on the Mackey-Glass and Lorenz systems.  ...  The above suggests that this could be extended to a formal proof. We now turn to chaos cryptography. In such a system, Alice sends Bob a times series s(n) in which her message m(n) is hidden.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1103/physreve.98.012215">doi:10.1103/physreve.98.012215</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/30110744">pmid:30110744</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kjkcaitxdfdkjmxrf3xb3agdca">fatcat:kjkcaitxdfdkjmxrf3xb3agdca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190223182246/http://pdfs.semanticscholar.org/543b/7a8bfd9f7c8daee9b68e3674a81e898aa875.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/54/3b/543b7a8bfd9f7c8daee9b68e3674a81e898aa875.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1103/physreve.98.012215"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> aps.org </button> </a>

SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies [article]

Sarah Azouvi, Alexander Hicks
<span title="2020-02-21">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Understanding how to incorporate this into the models used to design cryptocurrencies has motivated a large body of work, yet many open problems still exist and current systems rarely deal with incentive  ...  With this work, we aim to offer a systematization of the work that relates to this problem, considering papers that blend Game Theory with Cryptography or Distributed systems and discussing how they can  ...  Both papers use informal arguments to justify their construction as opposed to a formal model. In a recent paper, Kwon et al.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1905.08595v2">arXiv:1905.08595v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qmg2qtn3avf4jlqaorbnix3t4e">fatcat:qmg2qtn3avf4jlqaorbnix3t4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321045422/https://arxiv.org/pdf/1905.08595v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1905.08595v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

The potential impact of quantum computers on society

Ronald de Wolf
<span title="2017-09-15">2017</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ah37m2ztbvcbnnkuypnp5ln4kq" style="color: black;">Ethics and Information Technology</a> </i> &nbsp;
It focuses on three areas: cryptography, optimization, and simulation of quantum systems.  ...  Partially supported by ERC Consolidator Grant 615307 QPROGRESS. 1 The first digital computers were built a few years later.  ...  the shortest route between two points on a map [DHHM06] , approximately solving large systems of linear equations (in a somewhat weak sense) [HHL09] , as well as other problems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10676-017-9439-z">doi:10.1007/s10676-017-9439-z</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j7ekrg6a7rdwdmkutclejpqw6m">fatcat:j7ekrg6a7rdwdmkutclejpqw6m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720221330/https://ir.cwi.nl/pub/27173/1712.05380.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/e5/0fe582885cb76d5d7ae66cd113cbc372b27f6c9a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10676-017-9439-z"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,819 results