Search
Search Results
-
Cryptographic Primitives with Hinting Property
A hinting pseudorandom generator (PRG) is a potentially stronger variant of PRG with a “deterministic” form of circular security with respect to the...
-
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
The distance-bounding protocol based on Russian cryptographic algorithms
In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...
-
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
Abstract—This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to...
-
Securing edge computing using cryptographic schemes: a review
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...
-
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...
-
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware
Ransomware attacks have captured news headlines worldwide for the last few years due to their criticality and intensity. Ransomware-as-a-service...
-
Properties of Lattice Isomorphism as a Cryptographic Group Action
In recent years, the Lattice Isomorphism Problem (LIP) has served as an underlying assumption to construct quantum-resistant cryptographic... -
A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments
Cloud computing is becoming more and more popular, which is a sign of its importance in the information technology industry because it allows for...
-
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
Cloud computing has data leakage from all parties, security protection of private data, and existing solutions do not provide a trade-off between...
-
Towards Verifying Physical Assumption in Card-Based Cryptography
Card-based cryptography realizes cryptographic tasks, such as secure computation, with a deck of physical cards. The primary research subjects for... -
Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used...
-
A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases
Recent progression in Information Technology facilitated the collection and storage of large amounts of data to be accessed by multiple parties in a...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
Cryptographic Primitives
Blockchain and cryptocurrencies including Bitcoin rely on cryptographic methods to maintain security and privacy. Cryptography is a mathematical and... -
Explaining the Use of Cryptographic API in Android Malware
Cryptography allows for guaranteeing secure communications, concealing critical data from reverse engineering, or ensuring mobile users’ privacy.... -
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
Cryptographic accumulators, introduced in 1993 by Benaloh and De Mare, represent a set with a concise value and offer proofs of (non-)membership.... -
Geometry-Based Garbled Circuits Relying Solely on One Evaluation Algorithm Under Standard Assumption
Garbled circuits are the leading cryptographic techniques for constant-round secure two-party computation (S2PC). Classical constructions of Garbled... -
An algebraic approach to symmetric linear layers in cryptographic primitives
Subterranean 2.0 is a permutation-based cipher suite which works with a 257 bit-state. It is designed for lightweight cryptography, and it scores...
-
Using Analog Side Channels to Attack Cryptographic Implementations
This chapter overviews analog side-channel attacks on recent implementations of the two most popular public-key cryptography approaches, namely...