Filters








2,959 Hits in 5.3 sec

The Power of Negations in Cryptography [chapter]

Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We then initiate a quantitative study of the power of negations, asking how many negations are required.  ...  , showing a lower bound on the depth of any circuit with t negations on the bottom that computes a monotone function f in terms of the monotone circuit depth of f .  ...  Acknowledgements We would like to thank Ilan Orlov for helpful conversations during an early stage of this work, Rocco Servedio for suggesting an initial construction in Proposition 5.3, and Andrej Bogdanov  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_3">doi:10.1007/978-3-662-46494-6_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e6fea6drprg2hh6n4lukojdz2a">fatcat:e6fea6drprg2hh6n4lukojdz2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318094041/http://eprint.iacr.org/2014/902.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/89/33/89334725e535e764ec710c39ae04c53a85fb7d90.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey

Heena Dogra, Jyoti Kohli
<span title="2016-12-28">2016</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
Finding: For the solution of efficient and reliable security needs cryptography algorithms provides good solutions.  ...  In wireless sensor networks nodes are connected to sense and communicate the data to the base station.  ...  Its disadvantage is less memory and processing power limitations. • Symmetric Keys: 10 In this scheme every node of the communicating network in advance have a set of link keys for establishing secure  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2015/v8i1/106883">doi:10.17485/ijst/2015/v8i1/106883</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7fqcjplssngptlhmy5ttdhobfm">fatcat:7fqcjplssngptlhmy5ttdhobfm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428033507/http://www.indjst.org/index.php/indjst/article/download/106883/76786" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2015/v8i1/106883"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A New Approach for Secured Transition using Prime Field Elliptic Curve Cryptography System

Muhammad Firoz Mridha
<span title="2011-08-31">2011</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Prime Field Elliptic curve cryptosystems (PFECC) are becoming most popular because of the reduced number of key bits required in comparison to other cryptosystems.  ...  The demands of secured electronic transactions are increasing rapidly.  ...  Subtraction (Addition of negation): P-Q MOD R = P+(-Q) MOD R. (Addition of negation can be calculated by: -M MOD N=(|M| MOD N)-N.)  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/3379-4685">doi:10.5120/3379-4685</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xv7dtlvctjaoxi2apvp7gprjuy">fatcat:xv7dtlvctjaoxi2apvp7gprjuy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813181017/http://www.ijcaonline.org/volume28/number4/pxc3874685.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/c7/7dc7669024471ce81643125d9965e73cbbb56fa6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/3379-4685"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

K.S. Seethalakshmi
<span title="">2016</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
As a result of widespread use of communication medium over the internet, information security has become the area of concern. In the field of internet, the main issue is the data security.  ...  Hence in order to achieve higher level of security, both image steganography and visual cryptography are required.  ...  Hence, when we combine cryptography with steganography, it results in a powerful tool which enables the people to transmit sensitive data over the internet securely, without possible eavesdropper even  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-15010010157-61">doi:10.9790/0661-15010010157-61</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbgewr7dhzgfvgab4342hpw3fu">fatcat:kbgewr7dhzgfvgab4342hpw3fu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170102212705/http://www.iosrjournals.org/iosr-jce/papers/conf.15010/Volume%201/10.%2057-61.pdf?id=7557" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/4f/524f155f93f10f949eeac86940bebe575cf3d612.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-15010010157-61"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Elliptic Curve Cryptography based RFID Authentication Schemes for Internet of Things

R. Bagavath Sri, S. Karthikeyan
<span title="2016-11-15">2016</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
In such situation, high level of security must be ensured to prevent fatal medical errors. RFID technology is generally used in the medical environment.  ...  Applications of elliptic curve algorithm are considered and several cryptography modules are analyzed. Heavy weight schemes are considered to be highly secure.  ...  Acknowledgements The authors wish to thank all anonymous reviewers for their valuable comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i42/104589">doi:10.17485/ijst/2016/v9i42/104589</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pk2ffaw5mffuhppyvbvj7jathi">fatcat:pk2ffaw5mffuhppyvbvj7jathi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719141219/http://www.indjst.org/index.php/indjst/article/download/104589/74897" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i42/104589"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Arithmetic Operations In Multi-Valued Logic

Vasundara Patel K S, K S Gurumurthy
<span title="2018-04-11">2018</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Logic design of each operation is achieved by reducing the terms using Karnaugh diagrams, keeping minimum number of gates and depth of net in to onsideration.  ...  Negation in modular arithmetic is designed with only one gate.  ...  Many of the private and public-key algorithms in cryptography aim to achieve high level security, which relies on computations in GF (2 k ).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1216775">doi:10.5281/zenodo.1216775</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mdgatyhqzff2nd237pihdafjfu">fatcat:mdgatyhqzff2nd237pihdafjfu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722002717/https://zenodo.org/record/1216775/files/0310vlsics3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/28/db283798234fbd7763b34fd06d71cc5328ca0173.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1216775"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography [chapter]

Selçuk Baktır, Berk Sunar
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We introduce an efficient method for computing Montgomery products of polynomials in the frequency domain.  ...  relevant to elliptic curve cryptography (ECC).  ...  Similarly, multiplication of an n-bit number with integer powers of −2 k modulo M n can be achieved with a simple bitwise left rotation of the number, in addition to a negation if the power of −2 k is  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11902140_103">doi:10.1007/11902140_103</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3edcv3utqvh3bdkkypwo56d3rq">fatcat:3edcv3utqvh3bdkkypwo56d3rq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401052131/http://www.crypto.wpi.edu/Publications/Documents/ISCIS2006_DFTmul.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/eb/33ebfd3e9e214d66f3d6368b1d30ef20651cdda8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11902140_103"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs

Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini, Michael Wagner
<span title="2018-07-05">2018</span> <i > <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qnp47ut6vrdjjmiy7zdltauwje" style="color: black;">European Conference on Object-Oriented Programming</a> </i> &nbsp;
CrySL enables cryptography experts to specify the secure usage of the cryptographic libraries that they provide.  ...  In this paper, we present CrySL, a definition language for bridging the cognitive gap between cryptography experts and developers.  ...  Acknowledgements We would like to thank the maintainers of AndroZoo for allowing us to use their data set in our evaluation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4230/lipics.ecoop.2018.10">doi:10.4230/lipics.ecoop.2018.10</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ecoop/KrugerS0BM18.html">dblp:conf/ecoop/KrugerS0BM18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/52jankc2inabfhzrzsxw3fwhza">fatcat:52jankc2inabfhzrzsxw3fwhza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220120141201/https://drops.dagstuhl.de/opus/volltexte/2018/9215/pdf/LIPIcs-ECOOP-2018-10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8b/20/8b2038aff4b78eb0b3cf70e4f716d17d3b921b98.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4230/lipics.ecoop.2018.10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Cloud Application Security using Hybrid Encryption

Alabi Orobosade, Thompson Aderonke, Alese Boniface, Arome J.
<span title="2020-05-29">2020</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sjl377mf3vf25p5t3aibekr6ai" style="color: black;">Communications on Applied Electronics</a> </i> &nbsp;
encryption scheme with AES key to achieve our aim of data confidentiality as well as is security in the cloud.  ...  safeguarding users' privacy and security in the cloud.  ...  INTRODUCTION Cloud refers to the synergy of available computing power across the Internet.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/cae2020652866">doi:10.5120/cae2020652866</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wps2yrflxbbsbj67a2765kxjxi">fatcat:wps2yrflxbbsbj67a2765kxjxi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220228055553/https://www.caeaccess.org/archives/volume7/number33/orobosade-2020-cae-652866.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e0/4c/e04cb8425156d1184a6abcfbbeec67ffe0a5d069.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/cae2020652866"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Epistemic adverbs, the prosody-syntax interface, and the theory of phases [chapter]

Alessandra Giorgi
<span title="2016-01-22">2016</span> <i title="John Benjamins Publishing Company"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6nsg46h6argshhhqbbrlygwtbe" style="color: black;">Romance Languages and Linguistic Theory</a> </i> &nbsp;
The existence of a low left periphery above v*P agrees has also been recently hypothesized for other phenomena in Old (Poletto, 2006 and to appear) and Modern Italian (Belletti, 2004) .  ...  Cinque (1999) proposed that they always occupy the same position above IP and that the various orders are derived via movement of the other phrases around them.  ...  There is a contrast between examples (4) and (6) with respect to the scope of negation, in particular with respect to the non-availability of the position 3 in the sentence with negation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1075/rllt.9.06gio">doi:10.1075/rllt.9.06gio</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/onewjvwvozedblksznafx7plea">fatcat:onewjvwvozedblksznafx7plea</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922031257/https://iris.unive.it/retrieve/handle/10278/3666232/62294/06gio%20%281%29.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b0/00/b000148ffab9b79197c9a80666c7988b037ee37b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1075/rllt.9.06gio"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

The Vision of Secure RFID

Ari Juels
<span title="">2007</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
RFID is poised then to become one of the sensory organs of our computing networks. Clarity in this emerging power of sight is important.  ...  Equally essential are the integrity of the data collected by RFID systems and appropriate curbs on the technology's X-ray power.  ...  RFID is poised then to become one of the sensory organs of our computing networks. Clarity in this emerging power of sight is important.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2007.900324">doi:10.1109/jproc.2007.900324</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2occgruzafej3bifkd4maqdesm">fatcat:2occgruzafej3bifkd4maqdesm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120326155333/http://www.eleceng.adelaide.edu.au/groups/thz/documents/Juels_2007_ieee.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ab/f8/abf84358bbb35fcc26cad56d947a47bbf3f16b9b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2007.900324"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Flexible Prime-Field Genus 2 Hyperelliptic Curve Cryptography Processor with Low Power Consumption and Uniform Power Draw

Hamid-Reza Ahmadi, Ali Afzali-Kusha, Massoud Pedram, Mahdi Mosaffa
<span title="2015-02-01">2015</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sfkftjpfyneypmldn7no2ilfpm" style="color: black;">ETRI Journal</a> </i> &nbsp;
We also present a technique to make the power consumption of the HECC processor more uniform and lower the peaks of its power consumption.  ...  The optimized implementation, which is synthesized in a 0.13 mm standard CMOS technology, performs an 81-bit divisor multiplication in 503 ms consuming only 6.55 mJ of energy (average power consumption  ...  Power Consumption Redistribution In this section, we discuss the importance of uniform power consumption in cryptography circuits and describe our efforts at making the power consumption of our HECC processor  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4218/etrij.15.0114.0418">doi:10.4218/etrij.15.0114.0418</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/evpvzobkhnaktousayrymomlpu">fatcat:evpvzobkhnaktousayrymomlpu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829092501/http://www.mpedram.com/Papers/HECC-ETRI-journal.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/74/02/74026b6cf85c3714c034e5f6097e3f8519dffbc8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4218/etrij.15.0114.0418"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

The status of the P versus NP problem

Lance Fortnow
<span title="2009-09-01">2009</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/i6iajiiyxvgz3ob6jwcn2pufni" style="color: black;">Communications of the ACM</a> </i> &nbsp;
Josh Grochow wrote an early draft of Section 9. The anonymous referees provided critical advice. Some of the material in this article has appeared in my earlier surveys and my blog [14] .  ...  Computational power has dramatically increased, the cost of computing has dramatically decreased, not to mention the power of the Internet.  ...  Consider the 3SAT problem, solving Boolean formula satisfiability where formulas are in the form of the AND of several clauses where each clause is the OR of three literal (variables or negations of variables  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1562164.1562186">doi:10.1145/1562164.1562186</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gxquaagohnc7jdxdhaaexzof44">fatcat:gxquaagohnc7jdxdhaaexzof44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811211059/http://www.math.tamu.edu/~rojas/fortnowpnpsurvey.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/9b/999b27aeaf367f16861b250c4ed214b08b549f53.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1562164.1562186"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Cryptographic design vulnerabilities

B. Schneier
<span title="">1998</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dsrvu6bllzai7oj3hktnc5yf4q" style="color: black;">Computer</a> </i> &nbsp;
Strong cryptography is very powerful when it is done right, but it is not a panacea.  ...  In PPTP, for example, we found the strong RC4 algorithm used in a mode that almost completely negated its security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/2.708447">doi:10.1109/2.708447</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gumayzqfczbfjp5l5nibkdobza">fatcat:gumayzqfczbfjp5l5nibkdobza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040714153557/http://come.ssu.ac.kr:80/~ieee/computer/co1998/r9029.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/10/0510f6cb8d23b5928589f846deba3d4b3e81c36f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/2.708447"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

P vs NP

Frank Vega
<span title="2018-06-09">2018</span> <i title="Figshare"> Figshare </i> &nbsp;
P versus NP is considered as one of the most important open problems in computer science. This consists in knowing the answer of the following question: Is P equal to NP?  ...  It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute.  ...  We define a CN F Boolean formula using the following terms. A literal in a Boolean formula is an occurrence of a variable or its negation [5] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.6406145.v7">doi:10.6084/m9.figshare.6406145.v7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/phtn3ks4yfcp5nexqtlrvjbque">fatcat:phtn3ks4yfcp5nexqtlrvjbque</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200223103819/https://s3-eu-west-1.amazonaws.com/pfigshare-u-files/11897120/paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/55/4855e343281c0fe256d2ec70b9564ef36f2709d5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.6406145.v7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> figshare.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 2,959 results