We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,702 results
  1. Securing edge computing using cryptographic schemes: a review

    The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in Multimedia Tools and Applications
    Article 27 September 2023
  2. Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme

    The construction and development of new techniques for a nonlinear multivalued Boolean function is one of the important aspects of modern ciphers....

    Nabilah Abughazalah, Asim Latif, ... Iqtadar Hussain in Artificial Intelligence Review
    Article 31 October 2022
  3. A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases

    Recent progression in Information Technology facilitated the collection and storage of large amounts of data to be accessed by multiple parties in a...

    Ashutosh Saxena, P. Radha Krishna in Journal of Banking and Financial Technology
    Article 25 May 2022
  4. PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market

    Electronic devices that populate the Internet of Things play increasingly important roles in our everyday lives. When these devices process, store,...
    Asmita Adhikary, Abraham Basurto, ... Nusa Zidaric in Applied Reconfigurable Computing. Architectures, Tools, and Applications
    Conference paper 2024
  5. Artificial Intelligence for the Design of Symmetric Cryptographic Primitives

    This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief...
    Luca Mariot, Domagoj Jakobovic, ... Julio Hernandez-Castro in Security and Artificial Intelligence
    Chapter 2022
  6. Implementation of RSA cryptographic algorithm using SN P systems based on HP/LP neurons

    Asymmetric cryptographic systems are often more complex and require more computational power than symmetric systems. This is why they might be...

    Ganbat Ganbaatar, Dugar Nyamdorj, ... Tseren-Onolt Ishdorj in Journal of Membrane Computing
    Article 11 March 2021
  7. Delegating Supersingular Isogenies over \(\mathbb {F}_{p^2}\) with Cryptographic Applications

    Although isogeny-based cryptographic schemes enjoy the smallest key sizes amongst current post-quantum cryptographic candidates, they come at a high...
    Robi Pedersen, Osmanbey Uzunkol in Information Security and Cryptology – ICISC 2021
    Conference paper 2022
  8. Towards accurate keyspace analysis of chaos-based image ciphers

    In recent years, there has been a surge in new chaos-based cryptographic algorithms, many of which claim to have unusually large keyspaces. Although...

    Abubakar Abba, Je Sen Teh, Moatsum Alawida in Multimedia Tools and Applications
    Article Open access 02 March 2024
  9. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

    The Internet of Things (IoT) is increasingly becoming widespread in different areas such as healthcare, transportation, and manufacturing. IoT...

    Mahdi R. Alagheband, Atefeh Mashatan in The Journal of Supercomputing
    Article Open access 13 June 2022
  10. Theoretical differential fault attacks on FLIP and FiLIP

    In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an...

    Pierrick Méaux, Dibyendu Roy in Cryptography and Communications
    Article 25 January 2024
  11. Model architecture level privacy leakage in neural networks

    Privacy leakage is one of the most critical issues in machine learning and has attracted growing interest for tasks such as demonstrating potential...

    Yan Li, Hongyang Yan, ... ** Li in Science China Information Sciences
    Article 17 October 2023
  12. A survey on lattice-based digital signature

    Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich...

    Fengxia Liu, Zhiyong Zheng, ... Qun Xu in Cybersecurity
    Article Open access 01 April 2024
  13. Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications

    Data security poses a significant challenge in cloud computing, the Internet of Things (IoT), and blockchain applications. Attribute-Based Encryption...

    Kranthi Kumar Singamaneni, Kusum Yadav, ... Amandeep Kaur in Multimedia Tools and Applications
    Article 30 May 2024
  14. Insights Gained After a Decade of Cellular Automata-Based Cryptography

    Cellular Automata (CA) have been extensively used to implement symmetric cryptographic primitives, such as pseudorandom number generators and...
    Conference paper 2024
  15. Hunting the pertinency of hash and bloom filter combinations on GPU for fast pattern matching

    There has been rapid growth in the field of graphical processing unit (GPU) programming due to the drastic increase in the computing hardware...

    Radhakrishna Bhat, Reddy Kanala Thilak, Reddy Panyala Vaibhav in International Journal of Information Technology
    Article Open access 17 May 2022
  16. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing

    Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...

    Awaneesh Kumar Yadav, An Braeken, Manoj Misra in The Journal of Supercomputing
    Article 24 February 2023
  17. A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher

    The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...

    Everton R. Lira, Heverton B. de Macêdo, ... Gina M. B. Oliveira in Natural Computing
    Article 25 March 2023
  18. A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels

    Quantum communication, a field of applied quantum physics, is closely tied to quantum teleportation and quantum information processing, with a...
    Ivan Cvitić, Dragan Peraković in Digital Forensics and Cyber Crime
    Conference paper 2024
  19. Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning

    While centralized servers pose a risk of being a single point of failure, decentralized approaches like blockchain offer a compelling solution by...

    Ji Liu, Chunlu Chen, ... De**g Dou in Knowledge and Information Systems
    Article 25 April 2024
Did you find what you were looking for? Share feedback.