Search
Search Results
-
Deep learning-based biometric cryptographic key generation with post-quantum security
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...
-
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit
Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical...
-
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...
-
A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments
Cloud computing is becoming more and more popular, which is a sign of its importance in the information technology industry because it allows for...
-
Cryptographic Competitions
Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...
-
WAS: improved white-box cryptographic algorithm over AS iteration
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
Cryptographic Primitives with Hinting Property
A hinting pseudorandom generator (PRG) is a potentially stronger variant of PRG with a “deterministic” form of circular security with respect to the...
-
Cryptographic Security Through a Hardware Root of Trust
This work presents a novel approach to a Hardware Root-of-Trust that leverages System-on-Chip technology for the implementation of hardware... -
Enhancing the cryptographic key using sample entropy and whale optimization algorithm
Internet-of-Things (IoT) is one of the most rapidly develo** technologies of the twenty-first century. With the invention of 5G technology and the...
-
A symmetric neural cryptographic key generation scheme for Iot security
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to...
-
Counter Security Features of NIST-Approved Cryptographic Algorithms
Implementation of cryptographic algorithms should be done with great caution. We look at some of the pitfalls within the FIPS140 approved algorithms... -
RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices
IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...
-
The distance-bounding protocol based on Russian cryptographic algorithms
In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...
-
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
IoTs are increasingly gaining popularity and prevalence due to their extensive applications across various domains. They gather data from the real...
-
Securing edge computing using cryptographic schemes: a review
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...
-
Towards the design of new cryptographic algorithm and performance evaluation measures
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security...
-
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
A bivariate polynomial-based cryptographic hard problem and its applications
The problem of factoring a composite integer into the product of two distinct primes (the factoring problem) is one of the famous hard problems on...
-
Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients’ security in the “new normal” COVID-19 E-Health
Patients’ data security is an open challenge on any telemedicine system. The challenge has been extended enough in this unprecedented corona virus...