Zobrazeno 1 - 10
of 507
pro vyhledávání: '"Applied cryptography"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-15 (2024)
Abstract Deterministic encryption (DET) allows for fast retrieval of encrypted information, but it would cause significant leakage of frequency information of the underlying data, which results in an array of inference attacks. Simply replacing DET w
Externí odkaz:
https://doaj.org/article/acd2a02831c14d2da1ab247c4f305224
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9262 (2024)
Computing and networking are increasingly implemented in software. We design and build a software build assurance scheme detecting if there have been injections or modifications in the various steps in the software supply chain, including the source
Externí odkaz:
https://doaj.org/article/3c408b905c3a4d94a590c999f43e59e6
Publikováno v:
IEEE Access, Vol 11, Pp 62955-62969 (2023)
We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) a system manager broadcasts information to IoT devices, e.g., wireless environment, only the designated devices can identify operations se
Externí odkaz:
https://doaj.org/article/43ef327aa79b4f8484e3aed2df19c59c
Publikováno v:
IEEE Access, Vol 11, Pp 3338-3351 (2023)
In this work an NTT-based (Number Theoretic Transform) multiplier for code-based Post-Quantum Cryptography (PQC) is presented, supporting Quasi Cyclic Low/Moderate-Density Parity-Check (QC LDPC/MDPC) codes. The cyclic matrix product, which is the fun
Externí odkaz:
https://doaj.org/article/ac5de6347f40421f92e81ede718b265c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 6, Pp 3647-3660 (2022)
Colombia government wants to implement electronic voting. However, the existing electronic voting protocols only include some of the required security features and Colombia needs a protocol with all these features to ensure fraud-free elections. In t
Externí odkaz:
https://doaj.org/article/dadd31fce0fd47e58033dd643b971499
Autor:
Kristjane Koleci, Paolo Santini, Marco Baldi, Franco Chiaraluce, Maurizio Martina, Guido Masera
Publikováno v:
IEEE Access, Vol 9, Pp 66223-66240 (2021)
This work describes an efficient implementation of the iterative decoder that is the main part of the decryption stage in the LEDAcrypt cryptosystem, recently proposed for post-quantum cryptography based on low-density parity-check (LDPC) codes. The
Externí odkaz:
https://doaj.org/article/c53e2a40b3a84db68832a37ea18b36d6
Publikováno v:
IEEE Access, Vol 9, Pp 69210-69225 (2021)
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices. Countermeasures against these attacks are approached at different levels, from modified lo
Externí odkaz:
https://doaj.org/article/ede50e77365e484f8a94396c69c9357d
Publikováno v:
Conference proceedings of »eLearning and Software for Education« (eLSE) / Conference proceedings of »eLearning and Software for Education« (eLSE). 16(02):179-189
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1030736