Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Absolute security in terahertz wireless links
Security against eavesdrop** is one of the key concerns in the design of any
communication system. Many common considerations of the security of a wireless …
communication system. Many common considerations of the security of a wireless …
Overcoming leakage in scalable quantum error correction
Leakage of quantum information out of computational states into higher energy states
represents a major challenge in the pursuit of quantum error correction (QEC). In a QEC …
represents a major challenge in the pursuit of quantum error correction (QEC). In a QEC …
AES as error correction: Cryptosystems for reliable communication
In this letter, we show that the Advanced Encryption Standard (AES) cryptosystem can be
utilized as an error-correcting code to obtain reliability over noisy communication and data …
utilized as an error-correcting code to obtain reliability over noisy communication and data …
Coding-based hybrid post-quantum cryptosystem for non-uniform information
S Tarnopolsky, A Cohen - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We introduce for non-uniform messages a novel hybrid universal network coding
cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) …
cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) …
Crypto-mine: Cryptanalysis via mutual information neural estimation
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems
has an extensive history. However, estimating MI between unknown random variables in a …
has an extensive history. However, estimating MI between unknown random variables in a …
CERMET: Coding for Energy Reduction with Multiple Encryption Techniques --
This paper presents CERMET, an energy-efficient hardware architecture designed for
hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction …
hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction …
Network Coding-Based Post-Quantum Cryptography for Multi-Users with Different Security Permissions
We present a novel multi-legitimate-users hybrid universal network-coding cryptosystem
which provides secure Post-Quantum (PQ) cryptography at high communication rates for …
which provides secure Post-Quantum (PQ) cryptography at high communication rates for …
Cryptanalysis via Machine Learning Based Information Theoretic Metrics
The fields of machine learning (ML) and cryptanalysis share an interestingly common
objective of creating a function, based on a given set of inputs and outputs. However, the …
objective of creating a function, based on a given set of inputs and outputs. However, the …
A new security measure in secret sharing schemes and secure network coding
I Kurihara, J Kurihara, T Tanaka - IEEE Access, 2024 - ieeexplore.ieee.org
Linear secret sharing schemes protect secret information from leakage and destruction by
encoding secret information into multiple shares, where the secret information can be …
encoding secret information into multiple shares, where the secret information can be …
Error Correction Capabilities of Non-Linear Cryptographic Hash Functions
Linear hashes are known to possess error-correcting capabilities. However, in most
applications, non-linear hashes with pseudorandom outputs are utilized instead. It has also …
applications, non-linear hashes with pseudorandom outputs are utilized instead. It has also …