We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Cryptographic Primitives with Hinting Property

    A hinting pseudorandom generator (PRG) is a potentially stronger variant of PRG with a “deterministic” form of circular security with respect to the...

    Navid Alamati, Sikhar Patranabis in Journal of Cryptology
    Article 23 April 2024
  2. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  3. The distance-bounding protocol based on Russian cryptographic algorithms

    In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...

    Vladimir Belsky, Anastasiia Chichaeva, ... Kirill Tsaregorodtsev in Journal of Computer Virology and Hacking Techniques
    Article 17 May 2024
  4. Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet

    Abstract—

    This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to...

    P. V. Semyanov, S. V. Grezina in Automatic Control and Computer Sciences
    Article 01 December 2023
  5. Securing edge computing using cryptographic schemes: a review

    The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in Multimedia Tools and Applications
    Article 27 September 2023
  6. A survey on cryptographic techniques for protecting big data security: present and forthcoming

    Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...

    Siqi Lu, Jianhua Zheng, ... Chunxiang Gu in Science China Information Sciences
    Article 23 September 2022
  7. RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware

    Ransomware attacks have captured news headlines worldwide for the last few years due to their criticality and intensity. Ransomware-as-a-service...

    Md. Ahsan Ayub, Ambareen Siraj, ... Maanak Gupta in International Journal of Information Security
    Article 23 September 2023
  8. Properties of Lattice Isomorphism as a Cryptographic Group Action

    In recent years, the Lattice Isomorphism Problem (LIP) has served as an underlying assumption to construct quantum-resistant cryptographic...
    Benjamin Benčina, Alessandro Budroni, ... Mukul Kulkarni in Post-Quantum Cryptography
    Conference paper 2024
  9. A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments

    Cloud computing is becoming more and more popular, which is a sign of its importance in the information technology industry because it allows for...

    Chithanya K V K, V. Lokeswara Reddy in Multimedia Tools and Applications
    Article 01 April 2024
  10. Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

    Cloud computing has data leakage from all parties, security protection of private data, and existing solutions do not provide a trade-off between...

    Yun Luo, Yuling Chen, ... Hui Dou in Journal of Cloud Computing
    Article Open access 22 January 2024
  11. Towards Verifying Physical Assumption in Card-Based Cryptography

    Card-based cryptography realizes cryptographic tasks, such as secure computation, with a deck of physical cards. The primary research subjects for...
    Masahisa Shimano, Kazuo Sakiyama, Daiki Miyahara in Innovative Security Solutions for Information Technology and Communications
    Conference paper 2023
  12. Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

    This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used...

    Yoshifumi Manabe, Hibiki Ono in New Generation Computing
    Article Open access 03 February 2022
  13. A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases

    Recent progression in Information Technology facilitated the collection and storage of large amounts of data to be accessed by multiple parties in a...

    Ashutosh Saxena, P. Radha Krishna in Journal of Banking and Financial Technology
    Article 25 May 2022
  14. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  15. Cryptographic Primitives

    Blockchain and cryptocurrencies including Bitcoin rely on cryptographic methods to maintain security and privacy. Cryptography is a mathematical and...
    Xun Yi, Xuechao Yang, ... Zahir Tari in Blockchain Foundations and Applications
    Chapter 2022
  16. Explaining the Use of Cryptographic API in Android Malware

    Cryptography allows for guaranteeing secure communications, concealing critical data from reverse engineering, or ensuring mobile users’ privacy....
    Adam Janovsky, Davide Maiorca, ... Giorgio Giacinto in E-Business and Telecommunications
    Conference paper 2023
  17. Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs

    Cryptographic accumulators, introduced in 1993 by Benaloh and De Mare, represent a set with a concise value and offer proofs of (non-)membership....
    Anaïs Barthoulot, Olivier Blazy, Sébastien Canard in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  18. Geometry-Based Garbled Circuits Relying Solely on One Evaluation Algorithm Under Standard Assumption

    Garbled circuits are the leading cryptographic techniques for constant-round secure two-party computation (S2PC). Classical constructions of Garbled...
    **gyu Ning, Zhenhua Tan in Information Security and Cryptology
    Conference paper 2024
  19. An algebraic approach to symmetric linear layers in cryptographic primitives

    Subterranean 2.0 is a permutation-based cipher suite which works with a 257 bit-state. It is designed for lightweight cryptography, and it scores...

    Robert Christian Subroto in Cryptography and Communications
    Article Open access 14 February 2023
  20. Using Analog Side Channels to Attack Cryptographic Implementations

    This chapter overviews analog side-channel attacks on recent implementations of the two most popular public-key cryptography approaches, namely...
    Chapter 2023
Did you find what you were looking for? Share feedback.