Results for 'Cryptography'

89 found
Order:
  1.  52
    Quantum Cryptography.Serge Fehr - 2010 - Foundations of Physics 40 (5):494-531.
    Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by the laws of nature. This is in sharp contrast to standard cryptographic schemes, which can be broken in principle, i.e., when given sufficient computing power. From a theory point of view, quantum cryptography offers a beautiful interplay between the mathematics of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2.  11
    Wittgenstein's secret diaries: cryptography and semiotics.Dinda L. Gorlée - 2019 - New York, NY: Bloomsbury Academic.
    Introduction: silence and secrecy -- Symptoms -- Cryptography -- Cryptomnesia -- Fact or fiction -- Cryptosemiotician -- Tentative conclusion -- Appendix: list of coded passages from Wittgenstein's Nachlass.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  8
    Electronic Cryptography—Chance or Threat for Modern Democracy?Olaf Winkel - 2003 - Bulletin of Science, Technology and Society 23 (3):185-191.
    It is generally assumed that electronic cryptography benefits democracy because it can be instrumental in protecting free speech, which is considered a cornerstone for democracy. The author argues, however, that a close look at some aspects of democratic theory suggests that matters are not really as clear-cut. The fact that encryption can be abused in many ways also poses a threat to democracy. This paradox is examined in detail.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  48
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  24
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  43
    Skepticism and Cryptography.Barry S. Fagin, Leemon C. Baird, Jeffrey W. Humphries & Dino L. Schweitzer - 2007 - Knowledge, Technology & Policy 20 (4):231-242.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  30
    Politiques de la cryptographie.Pascal Jollivet - 2001 - Multitudes 4 (4):242-245.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  9. Non-associative public-key cryptography.Arkadius Kalka - 2016 - In Delaram Kahrobaei, Bren Cavallo & David Garber (eds.), Algebra and computer science. Providence, Rhode Island: American Mathematical Society.
     
    Export citation  
     
    Bookmark  
  10.  85
    (1 other version)Bounded Arithmetic, Cryptography and Complexity.Samuel R. Buss - 1997 - Theoria 63 (3):147-167.
  11. Whole-brain simulation, cryptography, and Turing's mystery machine.Diane Proudfoot & Jack Copeland - 2020 - The Turing Conversation.
    No categories
     
    Export citation  
     
    Bookmark  
  12.  13
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  12
    USACM News: USACM, cryptography, and copyright.Lauren Gelman - 1997 - Acm Sigcas Computers and Society 27 (1):16-17.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  14. Enforcing security with cryptography, chap. 20.S. Harari & L. Poinsot - forthcoming - Hermes.
    No categories
     
    Export citation  
     
    Bookmark  
  15.  60
    Peirce's contribution to american cryptography.Yvan Beaulieu - 2008 - Transactions of the Charles S. Peirce Society 44 (2):pp. 263-287.
    In an undated letter, Peirce claims that he can make a machine that will automatically encrypt and decrypt messages, an astonishing claim considering the state of American science during his time. In two undated manuscripts, Peirce actually describes a cryptosystem, a system for encrypting and decrypting, suggesting the use of arithmetical transformations and binary notation. The relationship between the manuscripts and the letter are discussed in the paper. The paper also describes Peirce’s cryptosystem, places it in its historical context and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The physics of quantum information: quantum cryptography, quantum teleportation, quantum computation.Armond Duwell - 2003 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 34 (2):331-334.
  17.  14
    Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Order Form.Sifeu Takougang Kingni, Gaetan Fautso Kuiate, Romanic Kengne, Robert Tchitnga & Paul Woafo - 2017 - Complexity:1-12.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  25
    Katherine Ellison. A Cultural History of Early Modern English Cryptography Manuals. xiii + 218 pp., figs., index. London/New York: Routledge, 2017. ISBN 9781472457646. [REVIEW]Karl de Leeuw - 2019 - Isis 110 (1):174-175.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Book review: Yves nievergelt, foundations of logic and mathematics: Applications to computer science and cryptography, birkäuser verlag, boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover. Dimensions (in inches): 1.00 × 9.96 × 7.36. [REVIEW]Walter A. Carnielli - 2004 - Studia Logica 78 (3):479-481.
    Book review r A. (2004). "Book review: Yves nievergelt, foundations of ...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  20.  32
    S. Barry Cooper and Andrew Hodges , The Once and Future Turing: Computing the World. Cambridge University Press, 2016. xviii + 379 pp.— therein: - Martin Davis. Algorithms, Equations, and Logic. pp. 4–19. - J.M.E. Hyland. The Forgotten Turing. pp. 20–33. - Andrew R. Booker. Turing and the Primes. pp. 34–52. - Ueli Maurer. Cryptography and Computation after Turing. pp. 53–77. - Kanti V. Mardia and S. Barry Cooper. Alan Turing and Enigmatic Statistics. pp. 78–89. - Stephen Wolfram. What Alan Turing Might Have Discovered. pp. 92–105. - Christof Teuscher. Designed versus Intrinsic Computation. pp. 106–116. - Solomon Feferman. Turing’s ‘Oracle’: From Absolute to Relative Computability and Back. pp. 300–334. - P.D. Welch. Turing Transcendent: Beyond the Event Horizon. pp. 335–360. - Roger Penrose. On Attempting to Model the Mathematical Mind. pp. 361–378. [REVIEW]Alasdair Urquhart - 2016 - Bulletin of Symbolic Logic 22 (3):354-356.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Applications of (Neutro/Anti)sophications to Semihypergroups.A. Rezaei, Florentin Smarandache & S. Mirvakili - 2021 - Journal of Mathematics 2021 (1):1-7.
    A hypergroup, as a generalization of the notion of a group, was introduced by F. Marty in 1934. The first book in hypergroup theory was published by Corsini. Nowadays, hypergroups have found applications to many subjects of pure and applied mathematics, for example, in geometry, topology, cryptography and coding theory, graphs and hypergraphs, probability theory, binary relations, theory of fuzzy and rough sets and automata theory, physics, and also in biological inheritance.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  13
    Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure.Md Mehedi Hasan, Noor Afiza Mohd Ariffin & Nor Fazlida Mohd Sani - 2023 - Journal of Intelligent Systems 32 (1).
    The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  22
    A client-side approach for privacy-preserving identity federation.Sébastien Canard, Eric Malville & Jacques Traoré - 2009 - Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  24.  14
    Structural analysis of code-based algorithms of the NIST post-quantum call.M. A. González de la Torre, L. Hernández Encinas & J. I. Sánchez García - forthcoming - Logic Journal of the IGPL.
    Code-based cryptography is currently the second most promising post-quantum mathematical tool for quantum-resistant algorithms. Since in 2022 the first post-quantum standard Key Encapsulation Mechanism, Kyber (a latticed-based algorithm), was selected to be established as standard, and after that the National Institute of Standards and Technology post-quantum standardization call focused in code-based cryptosystems. Three of the four candidates that remain in the fourth round are code-based algorithms. In fact, the only non-code-based algorithm (SIKE) is now considered vulnerable. Due to this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  38
    Fanged Noumena: collected writings 1987-2007.Nick Land - 2011 - New York, NY: Sequence Press. Edited by Robin Mackay & Ray Brassier.
    A dizzying trip through the mind(s) of the provocative and influential thinker Nick Land. During the 1990s British philosopher Nick Land's unique work, variously described as “rabid nihilism,” “mad black deleuzianism,” and “cybergothic,” developed perhaps the only rigorous and culturally-engaged escape route out of the malaise of “continental philosophy” —a route that was implacably blocked by the academy. However, Land's work has continued to exert an influence, both through the British “speculative realist” philosophers who studied with him, and through the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  26.  64
    The potential impact of quantum computers on society.Ronald de Wolf - 2017 - Ethics and Information Technology 19 (4):271-276.
    This paper considers the potential impact that the nascent technology of quantum computing may have on society. It focuses on three areas: cryptography, optimization, and simulation of quantum systems. We will also discuss some ethical aspects of these developments, and ways to mitigate the risks.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  27.  41
    Synergistic Information Processing Encrypts Strategic Reasoning in Poker.Seth Frey, Dominic K. Albino & Paul L. Williams - 2018 - Cognitive Science 42 (5):1457-1476.
    There is a tendency in decision‐making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  50
    Mercury, or, the Secret and Swift Messenger: Shewing How a Man May with Privacy and Speed Communicate His Thoughts to a Friend at Any Distance ; Together with an Abstract of Dr. Wilkins's Essays Towards a Real Character and a Philosophical Language.John Wilkins - 1708 - John Benjamins. Edited by Brigitte Asbach-Schnitker.
    Language planning comprises a number of different though related aspects of linguistic activity, its proper realm ranging from the 'improvement' of existing ...
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Electronic Coins.Craig Warmke - 2022 - Cryptoeconomic Systems 2 (1).
    In the bitcoin whitepaper, Satoshi Nakamoto (2008: 2) defines an electronic coin as a chain of digital signatures. Many have since defined a bitcoin as a chain of digital signatures. This latter definition continues to appear in reports from central banks, advocacy centers, and governments, as well as in academic papers across the disciplines of law, economics, computer science, cryptography, management, and philosophy. Some have even used it to argue that what we now call bitcoin is not the real (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Discrete and continuous: a fundamental dichotomy in mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
    The distinction between the discrete and the continuous lies at the heart of mathematics. Discrete mathematics (arithmetic, algebra, combinatorics, graph theory, cryptography, logic) has a set of concepts, techniques, and application areas largely distinct from continuous mathematics (traditional geometry, calculus, most of functional analysis, differential equations, topology). The interaction between the two – for example in computer models of continuous systems such as fluid flow – is a central issue in the applicable mathematics of the last hundred years. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Quantum computing.Amit Hagar & Michael Cuffaro - 2019 - Stanford Encyclopedia of Philosophy.
    Combining physics, mathematics and computer science, quantum computing and its sister discipline of quantum information have developed in the past few decades from visionary ideas to two of the most fascinating areas of quantum theory. General interest and excitement in quantum computing was initially triggered by Peter Shor (1994) who showed how a quantum algorithm could exponentially “speed-up” classical computation and factor large numbers into primes far more efficiently than any (known) classical algorithm. Shor’s algorithm was soon followed by several (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  32.  15
    Quantum theory, reconsideration of foundations 4: Växjö (Sweden), 11-16 June, 2007.Guillaume Adenier (ed.) - 2007 - Melville, N. Y.: American Institute of Physics.
    This conference was devoted to the 80 years of the Copenhagen Interpretation, and to the question of the relevance of the Copenhagen interpretation for the present understanding of quantum mechanics. It is in this framework that fundamental questions raised by quantum mechanics, especially in information theory, were discussed throughout the conference. As has become customary in our series of conference in Växjö, we were glad to welcome a fruitful assembly of theoretical physicists, experimentalists, mathematicians and even philosophers interested in the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  27
    Quantum Repeaters for Quantum Communication.H. J. Briegel, J. I. Cirac, W. Dür, G. Giedke & P. Zoller - 1999 - Vienna Circle Institute Yearbook 7:147-154.
    Quantum entanglement has been focus of fundamental debate since the original paper of Einstein, Podolsky and Rosen [1] and the work of Bell [2], discussing its implications on fundamental issues related to the concepts of physical reality and locality. It has only been during the last few years when it has been recognized that this feature of Quantum Mechanics may also have important applications in the fields of communication and computation. In particular, it has been shown that using entanglement would (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  16
    Casimir Force, Casimir Operators and the Riemann Hypothesis: Mathematics for Innovation in Industry and Science.Gerrit Dijk & Masato Wakayama (eds.) - 2010 - De Gruyter.
    This volume contains the proceedings of the conference "Casimir Force, Casimir Operators and the Riemann Hypothesis – Mathematics for Innovation in Industry and Science" held in November 2009 in Fukuoka. The conference focused on the following topics: Casimir operators in harmonic analysis and representation theory Number theory, in particular zeta functions and cryptography Casimir force in physics and its relation with nano-science Mathematical biology Importance of mathematics for innovation in industry.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  8
    An elementary transition to abstract mathematics.Gove W. Effinger - 2020 - Boca Raton: CRC Press, Taylor & Francis Group. Edited by Gary L. Mullen.
    An Elementary Transition to Abstract Mathematics will help students move from introductory courses to those where rigor and proof play a much greater role. The text is organized into five basic parts: the first looks back on selected topics from pre-calculus and calculus, treating them more rigorously, and it covers various proof techniques; the second part covers induction, sets, functions, cardinality, complex numbers, permutations, and matrices; the third part introduces basic number theory including applications to cryptography; the fourth part (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  8
    New Developments on Fundamental Problems in Quantum Physics.Miguel Ferrero & Alwyn van der Merwe (eds.) - 1997 - Springer.
    Quantum theory is one of the most fascinating and successful constructs in the intellectual history of mankind. Nonetheless, the theory has very shaky philosophical foundations. This book contains thoughtful discussions by eminent researchers of a spate of experimental techniques newly developed to test some of the stranger predictions of quantum physics. The advances considered include recent experiments in quantum optics, electron and ion interferometry, photon down conversion in nonlinear crystals, single trapped ions interacting with laser beams, atom-field coupling in micromaser (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  14
    (2 other versions)Agents of History.Bernard Dionysius Geoghegan - 2008 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 9 (3):403-414.
    World War II research into cryptography and computing produced methods, instruments and research communities that informed early research into artificial intelligence and semi-autonomous computing. Alan Turing and Claude Shannon in particular adapted this research into early theories and demonstrations of AI based on computers’ abilities to track, predict and compete with opponents. This formed a loosely bound collection of techniques, paradigms, and practices I call crypto-intelligence. Subsequent researchers such as Joseph Weizenbaum adapted crypto-intelligence but also reproduced aspects of its (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38. Computer Ethics: Encryption: Dvd.Ken Knisely & Patrick Sullivan - 2001 - Milk Bottle Productions.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  39. Computer Ethics: Encryption: No Dogs or Philosophers Allowed.Ken Knisely, Dorothy Denning & Patrick Sullivan - forthcoming - DVD.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  40.  12
    A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.Gongzheng Liu, Jingsha He & Xinggang Xuan - 2021 - Complexity 2021:1-12.
    Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data tampering. To solve problems given, this paper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  21
    Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.Zhuo Liu, Jin Yuan Liu, Leo Yu Zhang, Yong Zhao & Xiao Feng Gong - 2022 - Complexity 2022:1-18.
    The two-dimensional coupled map lattice model has been extensively employed as the basis component for designing various schemes in the cryptography system due to its complicated chaotic dynamic behavior. In this study, we analyze the chaotic characteristics of the 2D CML model, such as the Lyapunov exponent, synchronization stability, bifurcation, and ergodicity. We then show that the chaotic sequences generated by the 2D CML model are random according to the NIST testing. Furthermore, we propose an image encryption scheme based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  22
    What Arrow’s Information Paradox Says.Marco Pedicini & Mario Piazza - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich (eds.), On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 83-94.
    Arrow’s information paradox features the most radical kind of information asymmetry by diagnosing an inherent conflict between two parties inclined to exchange information. In this paper, we argue that this paradox is more richly textured than generally supposed by current economic discussion on it and that its meaning encroaches on philosophy. In particular, we uncovers the ‘epistemic’ and more genuine version of the paradox, which looms on our cognitive lives like a sort of tax on curiosity. Finally, we sketch the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  19
    HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme.Alagarswamy Ramaprasath & Heggere Rangaswamaiah Latha - 2023 - Journal of Intelligent Systems 32 (1).
    Image data play important role in various real-time online and offline applications. Biomedical field has adopted the imaging system to detect, diagnose, and prevent several types of diseases and abnormalities. The biomedical imaging data contain huge information which requires huge storage space. Moreover, currently telemedicine and IoT based remote health monitoring systems are widely developed where data is transmitted from one place to another. Transmission of this type of huge data consumes more bandwidth. Along with this, during this transmission, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  41
    Physical Entropy in Computer Games.Andreas Schiffler - 2010 - Technoetic Arts 8 (1):39-45.
    Digital computers are by design completely deterministic, yet they are often consumers of randomness in cryptography, simulations, science experiments and computer games. To generate randomness in software, programmers implement special mathematical algorithms, which produce a series of numbers that appear nondeterministic, so called pseudo random number generators (PRNGs). Computer games make heavy use of such PRNGs to make game simulations and behaviors of game elements appear more natural. An important design element of many video games is game physics, the (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45. Rossi, Paolo, Logic and the Art of Memory.J. Sutton - 2003 - Australasian Journal of Philosophy 81 (1):151-152.
    This translation of a classic and original work of intellectual history is beautifully done. Rossi’s book Clavis Universalis was first published in Italian in 1960, but Clucas translates the second, revised edition of 1983. The book is about Renaissance and 17th-century encyclopedism, hieroglyphics and cryptography, the techniques of artificial memory, the history of rhetoric, changes in views about logic and method in the scientific revolution, and new ideas about how language and images might reflect or capture reality. Frances Yates’s (...)
     
    Export citation  
     
    Bookmark  
  46.  20
    Quantum Chance: Nonlocality, Teleportation and Other Quantum Marvels.Nicolas Gisin - 2014 - Cham: Imprint: Copernicus.
    Quantum physics, which offers an explanation of the world on the smallest scale, has fundamental implications that pose a serious challenge to ordinary logic. Particularly counterintuitive is the notion of entanglement, which has been explored for the past 30 years and posits an ubiquitous randomness capable of manifesting itself simultaneously in more than one place. This amazing 'non-locality' is more than just an abstract curiosity or paradox: it has entirely down-to-earth applications in cryptography, serving for example to protect financial (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  48.  31
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  18
    Cybersecurity trends in Cooperative, Connected and Automated Mobility.O. Castillo Campo, V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz & R. Álvarez Fernández - forthcoming - Logic Journal of the IGPL.
    Cooperative, connected and automated mobility technologies have the potential to revolutionize transportation systems and enhance safety, efficiency and sustainability. However, the increasing reliance on digital technologies also introduces new cybersecurity risks that can compromise the safety and privacy of passengers and the integrity of transportation systems. The purpose of this article is to examine the most important threats, vulnerabilities, risks and challenges related to automated mobility and to review the status of the most promising standardization initiatives on cryptography in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50. Beyond measure: modern physics, philosophy, and the meaning of quantum theory.Jim Baggott - 2004 - New York: Oxford University Press.
    Quantum theory is one the most important and successful theories of modern physical science. It has been estimated that its principles form the basis for about 30 per cent of the world's manufacturing economy. This is all the more remarkable because quantum theory is a theory that nobody understands. The meaning of Quantum Theory introduces science students to the theory's fundamental conceptual and philosophical problems, and the basis of its non-understandability. It does this with the barest minimum of jargon and (...)
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 89