Zobrazeno 1 - 10
of 258
pro vyhledávání: '"Cong-Kha Pham"'
Autor:
Ta Viet Tai, Ma Pham Nhut Tan, Duong Hoang Tien, Nguyen Viet Ha, Trong-Thuc Hoang, Cong-Kha Pham, Tran Thi Thao Nguyen
Publikováno v:
IEEE Access, Vol 12, Pp 70184-70197 (2024)
Wearable devices have gained significant popularity for continuous Electrocardiogram (ECG) monitoring due to their compactness and convenience. Day-by-day and 24/7 monitoring without gaps is demanded to promptly detect unusual symptoms that are short
Externí odkaz:
https://doaj.org/article/1fed26d5362b4f028957ecabc5db0e89
Autor:
Phuc-Phan Duong, Hieu Minh Nguyen, Ba-Anh Dao, Binh Kieu-Do-Nguyen, Thai-Ha Tran, Trong-Thuc Hoang, Cong-Kha Pham
Publikováno v:
IEEE Access, Vol 12, Pp 63976-63994 (2024)
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis. This research presents a new approach for constructing lightweight
Externí odkaz:
https://doaj.org/article/e89dc2a6685f42279e7ed8ab035f9343
Publikováno v:
IEEE Access, Vol 12, Pp 34918-34930 (2024)
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Nu
Externí odkaz:
https://doaj.org/article/6ff691237ea543ad8c72bd40500075be
Autor:
Binh Kieu-Do-Nguyen, Nguyen The Binh, Cuong Pham-Quoc, Huynh Phuc Nghi, Ngoc-Thinh Tran, Trong-Thuc Hoang, Cong-Kha Pham
Publikováno v:
Information, Vol 15, Iss 7, p 400 (2024)
In the modern era of the Internet of Things (IoT), especially with the rapid development of quantum computers, the implementation of postquantum cryptography algorithms in numerous terminals allows them to defend against potential future quantum atta
Externí odkaz:
https://doaj.org/article/c0559041a0a244e987b98a7a16fcf536
Autor:
Tuan Ngoc Dao, Phuoc Thanh Quang Le, Tho Quang Than, Son Thanh Nguyen, Tung Thanh Huynh, Phuoc-Anh Le, Than Hong Phuc, Cong-Kha Pham
Publikováno v:
Tạp chí Khoa học và Công nghệ, Pp 25-32 (2023)
In this study, we describe the operation of piezoelectric energy converters and electromechanical modeling of piezoelectric energy harvesting (PEH) devices based on microelectromechanical systems (MEMS) for low-power sensors. Consideration is given t
Externí odkaz:
https://doaj.org/article/25803008fbe9404298dfd3e3a471ca4e
Publikováno v:
IET Information Security, Vol 17, Iss 3, Pp 377-393 (2023)
Abstract In modern embedded systems, security issues including side‐channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has b
Externí odkaz:
https://doaj.org/article/0198f9f51d0b4730b284287cfe551d2a
Publikováno v:
Future Internet, Vol 16, Iss 5, p 157 (2024)
Internet-of-things networks consist of multiple sensor devices spread over a wide area. In order to protect the data from unauthorized access and tampering, it is essential to ensure secure communication between the sensor devices and the central ser
Externí odkaz:
https://doaj.org/article/f8407a0c05944e08869583ffdf989df3
Publikováno v:
IEEE Access, Vol 11, Pp 4879-4894 (2023)
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications. Many proposals publ
Externí odkaz:
https://doaj.org/article/59c63d9e8723449db90bb38b01a56f3d
Publikováno v:
Cryptography, Vol 7, Iss 4, p 46 (2023)
The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h
Externí odkaz:
https://doaj.org/article/421ae8d7ab3c4e8a945f15cda8bf1711
Publikováno v:
IEEE Access, Vol 10, Pp 79213-79221 (2022)
True Random Number Generator (TRNG) provides the different keys for device authentication and cryptography. Typically, the TRNG is implemented in a standalone module into the systems, increasing the complexity and area of the implementation. In addit
Externí odkaz:
https://doaj.org/article/411d173a56484fa6b6ebb4eef04458f1