Search
Search Results
-
Resource allocation problem and artificial intelligence: the state-of-the-art review (2009–2023) and open research challenges
With the increasing growth of information through smart devices, enhancing the quality of human life necessitates the adoption of various...
-
Cutting the GRASS: Threshold GRoup Action Signature Schemes
Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the... -
Curve-Based Security Schemes for Automating the Encryption and Signing of Digital Documents in Organizational Environments
AbstractSensitive information in organizations is constantly increasing and at the same sense are the risks of attacks that compromise privacy,...
-
Breaking the \(O(\sqrt{n})\)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face of malicious agents, is a powerful primitive that...
-
Privacy Preserving Image Registration
Image registration is a key task in medical imaging applications, allowing to represent medical images in a common spatial reference frame. Current... -
Instant-Hybrid Neural-Cryptography (IHNC) based on fast machine learning
Nowadays, cryptographic systems’ designers are facing significant challenges in their designs. They have to constantly search for new ideas of fast...
-
Security Issues and Solutions for Reliable WBAN-Based e-Healthcare Systems: A Systematic Review
The advent of wireless communication technologies led to a revolutionary growth in e-healthcare systems. Wireless Body Area Network is one of the... -
Develo** Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud
Blockchain technology has drawn significant attention from academia and industry. Such technology offers unique features and capabilities, including... -
Verifpal: Cryptographic Protocol Analysis for the Real World
Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol... -
Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions
In the realm of IoT and blockchain, security and privacy are paramount. This paper explores the fusion of Zero-Knowledge Succinct Non-Interactive... -
Blind Side Channel Analysis on the Elephant LFSR Extended Version
The National Institute of Standards and Technology (NIST) started a competition for lightweight cryptography candidates for authenticated encryption.... -
"Survey and analysis of blockchain technologies with respect to: properties, algorithms, architecture, models, evolution and framework"
The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and...
-
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives
SAT, SMT, MILP, and CP, have become prominent in the differential cryptanalysis of cryptographic primitives. In this paper, we review the techniques... -
Crypto-anarchy: a paradigm shift for society and the legal system
This paper delves into the concept of crypto-anarchy, which has emerged in response to the growing dominance of governments and corporations over...
-
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning
Federated learning (FL) aims to derive a “better” global model without direct access to individuals’ training data. It is traditionally done by... -
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
Online game has become increasingly popular with people of all ages. But it also poses a number of security and privacy risks and children are... -
A generic framework for blockchain-assisted on-chain auditing for off-chain storage
In recent times, blockchain-based data auditing protocols have emerged as a cutting-edge area of study. Nevertheless, a conspicuous dearth of a...
-
Reliable Reputation-Based Event Detection in V2V Networks
Technological advances in automotive and vehicle-to-vehicle communication paradigms promise the implementation of increasingly advanced services to... -
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
Blockchain technology ensures the integrity and transparency of data access control by kee** an unchangeable record of all transactions. Fog...
-
Cryptography: Integrity and Authenticity
Data integrity can be protected using hash functions, message authentication codes, and digital signatures. These cryptographic mechanisms are...