Results for 'Cryptography '

92 found
Order:
  1.  42
    Quantum Cryptography.Serge Fehr - 2010 - Foundations of Physics 40 (5):494-531.
    Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by the laws of nature. This is in sharp contrast to standard cryptographic schemes, which can be broken in principle, i.e., when given sufficient computing power. From a theory point of view, quantum cryptography offers a beautiful interplay between the mathematics of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2.  31
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  5
    Electronic Cryptography—Chance or Threat for Modern Democracy?Olaf Winkel - 2003 - Bulletin of Science, Technology and Society 23 (3):185-191.
    It is generally assumed that electronic cryptography benefits democracy because it can be instrumental in protecting free speech, which is considered a cornerstone for democracy. The author argues, however, that a close look at some aspects of democratic theory suggests that matters are not really as clear-cut. The fact that encryption can be abused in many ways also poses a threat to democracy. This paradox is examined in detail.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  6
    Wittgenstein's secret diaries: cryptography and semiotics.Dinda L. Gorlée - 2019 - New York, NY: Bloomsbury Academic.
    Introduction: silence and secrecy -- Symptoms -- Cryptography -- Cryptomnesia -- Fact or fiction -- Cryptosemiotician -- Tentative conclusion -- Appendix: list of coded passages from Wittgenstein's Nachlass.
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  32
    Skepticism and Cryptography.Barry S. Fagin, Leemon C. Baird, Jeffrey W. Humphries & Dino L. Schweitzer - 2007 - Knowledge, Technology & Policy 20 (4):231-242.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  11
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Enforcing security with cryptography, chap. 20.S. Harari & L. Poinsot - forthcoming - Hermes.
    No categories
     
    Export citation  
     
    Bookmark  
  8. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  3
    Bounded Arithmetic, Cryptography and Complexity.Samuel R. Buss - 2008 - Theoria 63 (3):147-167.
  10.  77
    Bounded Arithmetic, Cryptography and Complexity.Samuel R. Buss - 1997 - Theoria 63 (3):147-167.
  11.  12
    Politiques de la cryptographie.Pascal Jollivet - 2001 - Multitudes 4 (4):242-245.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  12. Non-associative public-key cryptography.Arkadius Kalka - 2016 - In Delaram Kahrobaei, Bren Cavallo & David Garber (eds.), Algebra and computer science. Providence, Rhode Island: American Mathematical Society.
     
    Export citation  
     
    Bookmark  
  13. Whole-brain simulation, cryptography, and Turing's mystery machine.Diane Proudfoot & Jack Copeland - 2020 - The Turing Conversation.
    No categories
     
    Export citation  
     
    Bookmark  
  14.  3
    USACM News: USACM, cryptography, and copyright.Lauren Gelman - 1997 - Acm Sigcas Computers and Society 27 (1):16-17.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  15.  56
    Peirce's contribution to american cryptography.Yvan Beaulieu - 2008 - Transactions of the Charles S. Peirce Society 44 (2):pp. 263-287.
    In an undated letter, Peirce claims that he can make a machine that will automatically encrypt and decrypt messages, an astonishing claim considering the state of American science during his time. In two undated manuscripts, Peirce actually describes a cryptosystem, a system for encrypting and decrypting, suggesting the use of arithmetical transformations and binary notation. The relationship between the manuscripts and the letter are discussed in the paper. The paper also describes Peirce’s cryptosystem, places it in its historical context and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  27
    Book Review: Yves Nievergelt, Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography, Birkäuser Verlag, Boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover. Dimensions (in inches): 1.00 × 9.96 × 7.36. [REVIEW]Walter A. Carnielli - 2004 - Studia Logica 78 (3):479-481.
    This is a review of Yves Nievergelt, Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography, Birkäuser Verlag, Boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  11
    Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Order Form.Sifeu Takougang Kingni, Gaetan Fautso Kuiate, Romanic Kengne, Robert Tchitnga & Paul Woafo - 2017 - Complexity:1-12.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  29
    The physics of quantum information: quantum cryptography, quantum teleportation, quantum computation.Armond Duwell - 2003 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 34 (2):331-334.
  19.  11
    Katherine Ellison. A Cultural History of Early Modern English Cryptography Manuals. xiii + 218 pp., figs., index. London/New York: Routledge, 2017. ISBN 9781472457646. [REVIEW]Karl de Leeuw - 2019 - Isis 110 (1):174-175.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  60
    Book review: Yves nievergelt, foundations of logic and mathematics: Applications to computer science and cryptography, birkäuser verlag, boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover. Dimensions (in inches): 1.00 × 9.96 × 7.36. [REVIEW]Walter A. Carnielli - 2004 - Studia Logica 78 (3):479-481.
    Book review r A. (2004). "Book review: Yves nievergelt, foundations of ...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  27
    S. Barry Cooper and Andrew Hodges , The Once and Future Turing: Computing the World. Cambridge University Press, 2016. xviii + 379 pp.— therein: - Martin Davis. Algorithms, Equations, and Logic. pp. 4–19. - J.M.E. Hyland. The Forgotten Turing. pp. 20–33. - Andrew R. Booker. Turing and the Primes. pp. 34–52. - Ueli Maurer. Cryptography and Computation after Turing. pp. 53–77. - Kanti V. Mardia and S. Barry Cooper. Alan Turing and Enigmatic Statistics. pp. 78–89. - Stephen Wolfram. What Alan Turing Might Have Discovered. pp. 92–105. - Christof Teuscher. Designed versus Intrinsic Computation. pp. 106–116. - Solomon Feferman. Turing’s ‘Oracle’: From Absolute to Relative Computability and Back. pp. 300–334. - P.D. Welch. Turing Transcendent: Beyond the Event Horizon. pp. 335–360. - Roger Penrose. On Attempting to Model the Mathematical Mind. pp. 361–378. [REVIEW]Alasdair Urquhart - 2016 - Bulletin of Symbolic Logic 22 (3):354-356.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  59
    The physics of quantum information: Quantum cryptography, quantum teleportation, quantum computation - D. bouwmeester, A. Ekert and A. Zeilinger (eds.); Germany, 2000, 314pp, US$ 54, ISBN 3-540-66778-. [REVIEW]A. Duwell - 2003 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 34 (2):331-334.
  23. Applications of (Neutro/Anti)sophications to Semihypergroups.A. Rezaei, Florentin Smarandache & S. Mirvakili - 2021 - Journal of Mathematics 2021 (1):1-7.
    A hypergroup, as a generalization of the notion of a group, was introduced by F. Marty in 1934. The first book in hypergroup theory was published by Corsini. Nowadays, hypergroups have found applications to many subjects of pure and applied mathematics, for example, in geometry, topology, cryptography and coding theory, graphs and hypergraphs, probability theory, binary relations, theory of fuzzy and rough sets and automata theory, physics, and also in biological inheritance.
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  10
    Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure.Md Mehedi Hasan, Noor Afiza Mohd Ariffin & Nor Fazlida Mohd Sani - 2023 - Journal of Intelligent Systems 32 (1).
    The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  45
    Mercury, or, the Secret and Swift Messenger: Shewing How a Man May with Privacy and Speed Communicate His Thoughts to a Friend at Any Distance ; Together with an Abstract of Dr. Wilkins's Essays Towards a Real Character and a Philosophical Language.John Wilkins - 1708 - John Benjamins. Edited by Brigitte Asbach-Schnitker.
    Language planning comprises a number of different though related aspects of linguistic activity, its proper realm ranging from the 'improvement' of existing ...
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  12
    A client-side approach for privacy-preserving identity federation.Sébastien Canard, Eric Malville & Jacques Traoré - 2009 - Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  27.  28
    Fanged Noumena: collected writings 1987-2007.Nick Land - 2012 - New York, NY: Sequence Press. Edited by Robin Mackay & Ray Brassier.
    A dizzying trip through the mind(s) of the provocative and influential thinker Nick Land. During the 1990s British philosopher Nick Land's unique work, variously described as “rabid nihilism,” “mad black deleuzianism,” and “cybergothic,” developed perhaps the only rigorous and culturally-engaged escape route out of the malaise of “continental philosophy” —a route that was implacably blocked by the academy. However, Land's work has continued to exert an influence, both through the British “speculative realist” philosophers who studied with him, and through the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  28. Quantum computing.Amit Hagar & Michael Cuffaro - 2019 - Stanford Encyclopedia of Philosophy.
    Combining physics, mathematics and computer science, quantum computing and its sister discipline of quantum information have developed in the past few decades from visionary ideas to two of the most fascinating areas of quantum theory. General interest and excitement in quantum computing was initially triggered by Peter Shor (1994) who showed how a quantum algorithm could exponentially “speed-up” classical computation and factor large numbers into primes far more efficiently than any (known) classical algorithm. Shor’s algorithm was soon followed by several (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  29.  10
    Philosophical Explorations of the Legacy of Alan Turing: Turing 100.Alisa Bokulich & Juliet Floyd (eds.) - 2017 - Cham: Imprint: Springer.
    This volume presents an historical and philosophical revisiting of the foundational character of Turing's conceptual contributions and assesses the impact of the work of Alan Turing on the history and philosophy of science. Written by experts from a variety of disciplines, the book draws out the continuing significance of Turing's work. The centennial of Turing's birth in 2012 led to the highly celebrated "Alan Turing Year", which stimulated a world-wide cooperative, interdisciplinary revisiting of his life and work. Turing is widely (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Electronic Coins.Craig Warmke - 2022 - Cryptoeconomic Systems 2 (1).
    In the bitcoin whitepaper, Satoshi Nakamoto (2008: 2) defines an electronic coin as a chain of digital signatures. Many have since defined a bitcoin as a chain of digital signatures. This latter definition continues to appear in reports from central banks, advocacy centers, and governments, as well as in academic papers across the disciplines of law, economics, computer science, cryptography, management, and philosophy. Some have even used it to argue that what we now call bitcoin is not the real (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  32
    Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange.Patrick D. Anderson - 2020 - Ethics and Information Technology 23 (3):295-308.
    WikiLeaks is among the most controversial institutions of the last decade, and this essay contributes to an understanding of WikiLeaks by revealing the philosophical paradigm at the foundation of Julian Assange’s worldview: cypherpunk ethics. The cypherpunk movement emerged in the early-1990s, advocating the widespread use of strong cryptography as the best means for defending individual privacy and resisting authoritarian governments in the digital age. For the cypherpunks, censorship and surveillance were the twin evils of the computer age, but they (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  15
    What Arrow’s Information Paradox Says.Marco Pedicini & Mario Piazza - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich (eds.), On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 83-94.
    Arrow’s information paradox features the most radical kind of information asymmetry by diagnosing an inherent conflict between two parties inclined to exchange information. In this paper, we argue that this paradox is more richly textured than generally supposed by current economic discussion on it and that its meaning encroaches on philosophy. In particular, we uncovers the ‘epistemic’ and more genuine version of the paradox, which looms on our cognitive lives like a sort of tax on curiosity. Finally, we sketch the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  32
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  28
    The campaign for an ethical Internet.Jenny Shearer - 1998 - Acm Sigcas Computers and Society 28 (2):80-85.
    The fostering of an Internet societal infrastucture which is consciously ethical, is needed to curtail the new era of global irresponsibility that is at hand. The positive view advanced is contrasted with a scenario of the silencing of a moral Internet community using regulatory constraints, an extension of broadcast techniques, "brain-free" hardware, and control by multi-national corporations. This positive scenario is dependent on the evolution of a moral and responsible Internet global citizenry. The global citizen will recognise that in creating (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  35. Discrete and continuous: a fundamental dichotomy in mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
    The distinction between the discrete and the continuous lies at the heart of mathematics. Discrete mathematics (arithmetic, algebra, combinatorics, graph theory, cryptography, logic) has a set of concepts, techniques, and application areas largely distinct from continuous mathematics (traditional geometry, calculus, most of functional analysis, differential equations, topology). The interaction between the two – for example in computer models of continuous systems such as fluid flow – is a central issue in the applicable mathematics of the last hundred years. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  17
    A model-theoretic characterization of the weak pigeonhole principle.Neil Thapen - 2002 - Annals of Pure and Applied Logic 118 (1-2):175-195.
    We bring together some facts about the weak pigeonhole principle from bounded arithmetic, complexity theory, cryptography and abstract model theory. We characterize the models of arithmetic in which WPHP fails as those which are determined by an initial segment and prove a conditional separation result in bounded arithmetic, that PV + lies strictly between PV and S21 in strength, assuming that the cryptosystem RSA is secure.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  37.  15
    Quantum Chance: Nonlocality, Teleportation and Other Quantum Marvels.Nicolas Gisin - 2014 - Cham: Imprint: Copernicus.
    Quantum physics, which offers an explanation of the world on the smallest scale, has fundamental implications that pose a serious challenge to ordinary logic. Particularly counterintuitive is the notion of entanglement, which has been explored for the past 30 years and posits an ubiquitous randomness capable of manifesting itself simultaneously in more than one place. This amazing 'non-locality' is more than just an abstract curiosity or paradox: it has entirely down-to-earth applications in cryptography, serving for example to protect financial (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  18
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  40.  50
    Psychic ID: A blueprint for a modern national identity scheme.David G. W. Birch - 2008 - Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we assemble a (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  41.  24
    Quantum Repeaters for Quantum Communication.H. J. Briegel, J. I. Cirac, W. Dür, G. Giedke & P. Zoller - 1999 - Vienna Circle Institute Yearbook 7:147-154.
    Quantum entanglement has been focus of fundamental debate since the original paper of Einstein, Podolsky and Rosen [1] and the work of Bell [2], discussing its implications on fundamental issues related to the concepts of physical reality and locality. It has only been during the last few years when it has been recognized that this feature of Quantum Mechanics may also have important applications in the fields of communication and computation. In particular, it has been shown that using entanglement would (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  16
    Emerging advancements in mathematical sciences.Bhagwati Prasad Chamola, Pato Kumari & Lakhveer Kaur (eds.) - 2022 - New York: Nova Science Publishers.
    The present book of proceedings includes chapters related to the areas of pure, applied and inter-disciplinary mathematics reflecting the potential applications in the domains of sciences and engineering. The main areas include algebra and its applications, analysis and approximation theory, cryptography, computational fluid dynamics, continuum mechanics and vibrations, differential equations and applications, graph theory, fuzzy mathematics and logic, numerical analysis, optimization and its applications, wave propagation, etc. The scientists, engineers, academicians and researchers working in the proposed areas of coding (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. Онтология на квантовата информация.Vasil Penchev - 2005 - Philosophical Alternatives 14 (2):110-116.
    The article is devoted to quantum information (including its subdomains, namely: quantum communication, quantum computer, quantum cryptography), and its philosophical meaning. Paradox EPR, Bell’s inequality, phenomena of teleportation are discussed of a philosophical point of view. Quantum mechanical nonlocal correlations are interpreted as topological inseparabilities. Information is considered both as a fundamental physical quantity and as a philosophical category.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  13
    Specifying a principle of cryptographic justice as a response to the problem of going dark.Michael Wilson - 2023 - Ethics and Information Technology 25 (3):1-15.
    Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with end-to-end encryption (E2EE) are disrupting the acquisition and analysis of digital evidence. They have labelled this phenomenon the ‘problem of going dark’. Consequently, several jurisdictions have passed ‘responsible encryption’ laws that limit access to E2EE. Based upon a rhetorical analysis (Cunningham in Understanding rhetoric: a guide to critical reading and argumentation, BrownWalker Press, Boca Raton, 2018) of official statements about ‘going dark’, it is argued there is a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  11
    Aura & Transvestment1.Pablo Somonte Ruano - 2021 - Technoetic Arts 19 (3):365-381.
    Aura & Transvestment is a transmedia project consisting of a series of generative images, an experimental form of cryptomedia and a video essay. By describing its own powers and contradictions, the work explores notions of value, ownership, authenticity, artificial scarcity and abundance in the digital realm. The project is a critical analysis of non-fungible tokens used as proof of ownership for digital art, taking Walter Benjamin’s concept of aura as a starting point. It argues that, for tokenized art, cryptography (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  44
    The potential impact of quantum computers on society.Ronald de Wolf - 2017 - Ethics and Information Technology 19 (4):271-276.
    This paper considers the potential impact that the nascent technology of quantum computing may have on society. It focuses on three areas: cryptography, optimization, and simulation of quantum systems. We will also discuss some ethical aspects of these developments, and ways to mitigate the risks.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  47.  12
    JSE 31:4 Editorial.Stephen Braude - 2017 - Journal of Scientific Exploration 31 (4).
    Although this issue of the JSE, as usual, contains a diverse cocktail of interesting papers, two of those papers are sufficiently out of the ordinary to deserve a few comments. In this issue, we fearlessly address—for the second time in the JSE’s history—one of the thorniest and most interesting topics in English literature—namely, the debate over Shakespeare authorship. As some current SSE members are undoubtedly aware, many have challenged the orthodox view that the works of Shakespeare were written by the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  4
    A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.Gongzheng Liu, Jingsha He & Xinggang Xuan - 2021 - Complexity 2021:1-12.
    Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data tampering. To solve problems given, this paper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  8
    Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.Zhuo Liu, Jin Yuan Liu, Leo Yu Zhang, Yong Zhao & Xiao Feng Gong - 2022 - Complexity 2022:1-18.
    The two-dimensional coupled map lattice model has been extensively employed as the basis component for designing various schemes in the cryptography system due to its complicated chaotic dynamic behavior. In this study, we analyze the chaotic characteristics of the 2D CML model, such as the Lyapunov exponent, synchronization stability, bifurcation, and ergodicity. We then show that the chaotic sequences generated by the 2D CML model are random according to the NIST testing. Furthermore, we propose an image encryption scheme based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50. Философия на квантовата информация.Vasil Penchev - 2009 - Sofia: BAS: IPhR.
    The book is devoted to the contemporary stage of quantum mechanics – quantum information, and especially to its philosophical interpretation and comprehension: the first one of a series monographs about the philosophy of quantum information. The second will consider Be l l ’ s inequalities, their modified variants and similar to them relations. The beginning of quantum information was in the thirties of the last century. Its speed development has started over the last two decades. The main phenomenon is entanglement. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 92