We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 366 results
  1. Existence versus exploitation: the opacity of backdoors and backbones

    Boolean formulas often have what are known as hidden structures. We study the complexity of whether such structures (of certain sizes) exist in a...

    Lane A. Hemaspaandra, David E. Narváez in Progress in Artificial Intelligence
    Article 13 March 2021
  2. U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, the regulation to...
    Chapter 2023
  3. Embedding asymmetric backdoors into the RSA key generator

    This article describes the class of asymmetric backdoors in the RSA key generator. The algorithms are based on the classical Anderson’s backdoor, but...

    Article 11 August 2020
  4. Mathematical Foundation for Classical and Modern Cryptography

    The design of public-key cyphers prevents knowledge of the encryption key from revealing the identity of the decryption key. Making advantage of a...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  5. Blockchain-based immunization against kleptographic attacks

    Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel...

    Changsong Jiang, Chunxiang Xu, ... Kefei Chen in Science China Information Sciences
    Article 06 June 2024
  6. How to Backdoor (Classic) McEliece and How to Guard Against Backdoors

    We show how to backdoor the McEliece cryptosystem such that a backdoored public key is indistinguishable from a usual public key, but allows to...
    Tobias Hemmert, Alexander May, ... Carl Richard Theodor Schneider in Post-Quantum Cryptography
    Conference paper 2022
  7. Detection of non-trivial preservable quotient spaces in S-Box(es)

    Substitution Box (S-Box) is employed in block ciphers to ensure non-linearity. An n -bit bijective S-Box is a member of the Symmetric Group ...

    Shah Fahd, Mehreen Afzal, ... Yawar Abbas in Neural Computing and Applications
    Article 03 June 2023
  8. Specifying a principle of cryptographic justice as a response to the problem of going dark

    Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with end-to-end encryption (E2EE) are disrupting the acquisition...

    Article Open access 05 July 2023
  9. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

    The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...

    Shalaka S. Mahadik, Pranav M. Pawar, Raja Muthalagu in Multimedia Tools and Applications
    Article 29 September 2023
  10. Patent Landscape in the field of Hash-Based Post-Quantum Signatures

    Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  11. Security Risks from Vulnerabilities and Backdoors

    It is well-known that Alan Mathison Turing, a mathematician, put forward an abstract computing model, Turing Machine, and provided a solution to the...
    Jiangxing Wu in Cyberspace Mimic Defense
    Chapter 2020
  12. The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers

    Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for...
    Thomas Peyrin, Haoyang Wang in Advances in Cryptology – CRYPTO 2020
    Conference paper 2020
  13. On the Possibility of a Backdoor in the Micali-Schnorr Generator

    In this paper, we study both the implications and potential impact of backdoored parameters for two RSA-based pseudorandom number generators: the...
    Hannah Davis, Matthew D. Green, ... Adam Suhl in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  14. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system

    Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not...

    Varun Prabhakaran, Ashokkumar Kulandasamy in Journal of Reliable Intelligent Environments
    Article 05 March 2023
  15. A Medium-Length History of Digital Cryptography

    Having taken a look at the basics of digital cryptography in the previous chapter, we'll now move on to some specifics of the topic. We'll take a...
    Chapter 2020
  16. Security Architecture and Engineering

    Security Architecture and Engineering is one of the eight domains of the CISSP Common Body of Knowledge. This domain focuses on designing,...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  17. Quantum Computing, Digital Constitutionalism, and the Right to Encryption: Perspectives from Brazil

    This article examines how the debates on a right to encryption, understood within the framework of digital constitutionalism, may be impacted by the...

    Miriam Wimmer, Thiago Guimarães Moraes in Digital Society
    Article 12 August 2022
  18. Development of the RISC-V entropy source interface

    The RISC-V true random number generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the entropy source (ES) component...

    Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall in Journal of Cryptographic Engineering
    Article 06 January 2022
  19. A Survey on Security in Data Transmission in IoT: Layered Architecture

    The Internet of Things (IoT) is the communications technology where, physical objects, which are basically not designed for connection, will be able...
    Mandicou Ba, Lang Dionlar, ... Idy DIOP in Internet of Things – ICIOT 2023
    Conference paper 2024
  20. A Combination Reduction Algorithm and Its Application

    After the Snowden incident, cryptographic subversion attack has attracted widespread attentions. Subversion attack is an unconventional attack inside...
    Wei Yang, Shaojun Yang, ... Yong Zhao in Network and System Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.