We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for \(\varvec{\Sigma }\)-Protocols

    The Schnorr identification and signature schemes have been among the most influential cryptographic protocols of the past 3 decades. Unfortunately,...

    Lior Rotem, Gil Segev in Journal of Cryptology
    Article 06 June 2024
  2. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

    This paper presents a systematic review to identify research combining artificial intelligence (AI) algorithms with Open source intelligence (OSINT)...

    Thomas Oakley Browne, Mohammad Abedin, Mohammad Jabed Morshed Chowdhury in International Journal of Information Security
    Article Open access 05 June 2024
  3. Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes

    For projective Reed–Muller-type codes we give a global duality criterion in terms of the v-number and the Hilbert function of a vanishing ideal. As...

    Manuel González-Sarabia, Humberto Muñoz-George, ... Rafael H. Villarreal in Designs, Codes and Cryptography
    Article 05 June 2024
  4. Online Geometric Covering and Piercing

    We consider the online version of the piercing set problem, where geometric objects arrive one by one, and the online algorithm must maintain a valid...

    Minati De, Saksham Jain, ... Satyam Singh in Algorithmica
    Article 03 June 2024
  5. Slim Tree-Cut Width

    Tree-cut width is a parameter that has been introduced as an attempt to obtain an analogue of treewidth for edge cuts. Unfortunately, in spite of its...

    Robert Ganian, Viktoriia Korchemna in Algorithmica
    Article Open access 01 June 2024
  6. ZLR: a fast online authenticated encryption scheme achieving full security

    Online authenticated encryption has been considered of practical relevance in light-weight environments due to low latency and constant memory usage....

    Wonseok Choi, Seongha Hwang, ... Jooyoung Lee in Designs, Codes and Cryptography
    Article Open access 30 May 2024
  7. Approximating Long Cycle Above Dirac’s Guarantee

    Parameterization above (or below) a guarantee is a successful concept in parameterized algorithms. The idea is that many computational problems admit...

    Fedor V. Fomin, Petr A. Golovach, ... Kirill Simonov in Algorithmica
    Article Open access 30 May 2024
  8. Simple Constructions from (Almost) Regular One-Way Functions

    Two of the most useful cryptographic primitives that can be constructed from one-way functions are pseudorandom generators (PRGs) and universal...

    Noam Mazor, Jiapeng Zhang in Journal of Cryptology
    Article Open access 30 May 2024
  9. New Algorithms for Steiner Tree Reoptimization

    Reoptimization is a setting in which we are given a good approximate solution of an optimization problem instance and a local modification that...

    Davide Bilò in Algorithmica
    Article Open access 29 May 2024
  10. A compliance-based ranking of certificate authorities using probabilistic approaches

    The security of the global Certification Authority (CA) system has recently been compromised as a result of attacks on the Public Key Infrastructure...

    Kashif Junaid, Muhammad Umar Janjua, Junaid Qadir in International Journal of Information Security
    Article 29 May 2024
  11. Streaming approximation resistance of every ordering CSP

    Noah G. Singer, Madhu Sudan, Santhoshini Velusamy in computational complexity
    Article Open access 29 May 2024
  12. Algebraic Global Gadgetry for Surjective Constraint Satisfaction

    The constraint satisfaction problem (CSP) on a finite relational structure B is to decide, given a set of constraints on variables where the...

    Hubie Chen in computational complexity
    Article Open access 29 May 2024
  13. Approximation Algorithms for Covering Vertices by Long Paths

    Given a graph, the general problem to cover the maximum number of vertices by a collection of vertex-disjoint long paths seems to escape from the...

    Mingyang Gong, Brett Edgar, ... Eiji Miyano in Algorithmica
    Article 28 May 2024
  14. IoT cybersecurity in 5G and beyond: a systematic literature review

    The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature of remote monitoring for different applications such as...

    Sandeep Pirbhulal, Sabarathinam Chockalingam, ... Habtamu Abie in International Journal of Information Security
    Article 28 May 2024
  15. Constructions of t-strongly multimedia IPP codes with length \(t+1\)

    Strongly multimedia identifiable parent property code ( t -SMIPPC) was introduced for protecting multimedia contents from illegally redistributing...

    **g Jiang, Fenggui Pei, ... Henk D. L. Hollmann in Designs, Codes and Cryptography
    Article 28 May 2024
  16. Some new constructions of optimal linear codes and alphabet-optimal \((r,\delta )\)-locally repairable codes

    In distributed storage systems, an r -Locally Repairable Code ( r -LRC) ensures that a failed symbol can be recovered by accessing at most r other...

    **g Qiu, Fang-Wei Fu in Designs, Codes and Cryptography
    Article 24 May 2024
  17. Structure of CSS and CSS-T quantum codes

    We investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance. We give a lower bound...

    Elena Berardini, Alessio Caminata, Alberto Ravagnani in Designs, Codes and Cryptography
    Article 24 May 2024
Did you find what you were looking for? Share feedback.