About 590 results
Open links in new tab
  1. Feb 6, 2023 · Cryptography for Trusted Platform TS 33.117: "the network product shall support software package integrity validation via cryptographic means", e.g. digital signature.

  2. noticeable fraction of today’s Internet communication—Alice and Bob need to perform some computation and send some data but do not need any new hardware. Quantum cryptography …

  3. Multivariate-quadratic-equations public-key cryptography

    Applied cryptography and network security, 4th international conference, ACNS 2006, Singapore, June 6-9, 2006, proceedings. Lecture Notes in Computer Science 3989.

  4. Jul 30, 2024 · Some IETF drafts on hybrid mode NIST communicate with IETF through participations IEEE-SA IEEE P 1943 Standard for Post-Quantum Network Security IEEE P3172 Recommended …

  5. Mar 10, 2025 · tracksrights from re-use, re-processing and re-combination of resources via Value Tokens,allowing the network to befreelyavailabletoallparticipants, while offering revenue to resource …

  6. Jan 14, 2025 · of broader network security products. These commonly available security products need to be upgraded with quantum safe cryptographic techniques, and this paper explores some of the …

  7. Jan 5, 2023 · Pervasive network connection and information flow Security must be the first consideration Security proof adds confidence but should not be the solely considered criteria Still need to look into …

  8. Feb 11, 2025 · Identify instances where replacement must be coordinated with external organizations (e.g., network/internet service providers, cloud service providers, customers, logistics suppliers, other …

  9. Hash-based public-key cryptography

    Applied Cryptography and Network Security, 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007, proceedings. Lecture Notes in Computer Science 4521.

  10. Apr 16, 2025 · understand both software and hardware protocols and standards that would be needed to effectively run such a network. This touches directly on the mission space of CTL, ITL, and PML, …