We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Deep learning-based biometric cryptographic key generation with post-quantum security

    In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...

    Oleksandr Kuznetsov, Dmytro Zakharov, Emanuele Frontoni in Multimedia Tools and Applications
    Article 14 December 2023
  2. Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit

    Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical...

    Cui** Shao, Dongyan Zhao, ... Liuqing Yang in Journal of Cryptographic Engineering
    Article 02 June 2023
  3. A survey on cryptographic techniques for protecting big data security: present and forthcoming

    Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...

    Siqi Lu, Jianhua Zheng, ... Chunxiang Gu in Science China Information Sciences
    Article 23 September 2022
  4. A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments

    Cloud computing is becoming more and more popular, which is a sign of its importance in the information technology industry because it allows for...

    Chithanya K V K, V. Lokeswara Reddy in Multimedia Tools and Applications
    Article 01 April 2024
  5. Cryptographic Competitions

    Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...

    Daniel J. Bernstein in Journal of Cryptology
    Article Open access 08 December 2023
  6. WAS: improved white-box cryptographic algorithm over AS iteration

    The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution...

    Yatao Yang, Yuying Zhai, ... Yanshuo Zhang in Cybersecurity
    Article Open access 08 December 2023
  7. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  8. Cryptographic Primitives with Hinting Property

    A hinting pseudorandom generator (PRG) is a potentially stronger variant of PRG with a “deterministic” form of circular security with respect to the...

    Navid Alamati, Sikhar Patranabis in Journal of Cryptology
    Article 23 April 2024
  9. Cryptographic Security Through a Hardware Root of Trust

    This work presents a novel approach to a Hardware Root-of-Trust that leverages System-on-Chip technology for the implementation of hardware...
    Luis F. Rojas-Muñoz, Santiago Sánchez-Solano, ... Piedad Brox in Applied Reconfigurable Computing. Architectures, Tools, and Applications
    Conference paper 2024
  10. Enhancing the cryptographic key using sample entropy and whale optimization algorithm

    Internet-of-Things (IoT) is one of the most rapidly develo** technologies of the twenty-first century. With the invention of 5G technology and the...

    Md Saquib Jawed, Mohammad Sajid in International Journal of Information Technology
    Article 03 October 2023
  11. A symmetric neural cryptographic key generation scheme for Iot security

    The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to...

    Arindam Sarkar in Applied Intelligence
    Article 08 August 2022
  12. Counter Security Features of NIST-Approved Cryptographic Algorithms

    Implementation of cryptographic algorithms should be done with great caution. We look at some of the pitfalls within the FIPS140 approved algorithms...
    David Johnston, Richard Fant in Designing to FIPS-140
    Chapter 2024
  13. RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices

    IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...

    Shreyas Srinath, G. S. Nagaraja in SN Computer Science
    Article 28 June 2024
  14. The distance-bounding protocol based on Russian cryptographic algorithms

    In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...

    Vladimir Belsky, Anastasiia Chichaeva, ... Kirill Tsaregorodtsev in Journal of Computer Virology and Hacking Techniques
    Article 17 May 2024
  15. Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

    IoTs are increasingly gaining popularity and prevalence due to their extensive applications across various domains. They gather data from the real...

    Article 29 February 2024
  16. Securing edge computing using cryptographic schemes: a review

    The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in Multimedia Tools and Applications
    Article 27 September 2023
  17. Towards the design of new cryptographic algorithm and performance evaluation measures

    Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security...

    Anum Farooq, Sana Tariq, ... Kashif Hussain Memon in Multimedia Tools and Applications
    Article 26 June 2023
  18. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  19. A bivariate polynomial-based cryptographic hard problem and its applications

    The problem of factoring a composite integer into the product of two distinct primes (the factoring problem) is one of the famous hard problems on...

    Bagher Bagherpour in Designs, Codes and Cryptography
    Article 29 April 2023
  20. Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients’ security in the “new normal” COVID-19 E-Health

    Patients’ data security is an open challenge on any telemedicine system. The challenge has been extended enough in this unprecedented corona virus...

    Joydeep Dey, Anirban Bhowmik, Sunil Karforma in Multimedia Tools and Applications
    Article 07 March 2022
Did you find what you were looking for? Share feedback.