Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics

    Serving communications security, identity authentication, etc., cryptographic algorithms constitute the cornerstone of cyberspace security. During the past decades, cryptanalysts have proved that many once pre...

    Haoling Fan, Lingjia Meng, Fangyu Zheng in Applied Cryptography in Computer and Commu… (2022)

  2. No Access

    Chapter and Conference Paper

    PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers

    Elliptic curve cryptography (ECC) is respected in public key infrastructures (PKIs) due to its high performance and small key size. However, for some client devices with limited computing resources, signature ...

    Guangshen Cheng, Jiankuo Dong, **nyi Ji in Applied Cryptography and Network Security … (2022)