Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Miodrag J. Mihaljevic"'
Autor:
Miodrag J. Mihaljevic
Publikováno v:
IEEE Access, Vol 8, Pp 141258-141268 (2020)
A problem of developing the consensus protocols in public blockchain systems which spend a combination of energy and space resources is addressed. A technique is proposed that provides a flexibility for selection of the energy and space resources whi
Externí odkaz:
https://doaj.org/article/3a5e5466bf564261b859ad5b68187441
Publikováno v:
Symmetry, Vol 15, Iss 3, p 758 (2023)
As cyber attacks grow more complex and sophisticated, new types of malware become more dangerous and challenging to detect. In particular, fileless malware injects malicious code into the physical memory directly without leaving attack traces on disk
Externí odkaz:
https://doaj.org/article/4258d91266c04db8960bc5b3c990f86a
Publikováno v:
IET Information Security. 13:36-47
This study considers a class of randomised encryption techniques, where the encrypted data suffers from noise through transmission over a communication channel. It focuses on the encoding–encryption framework, where the data is first encoded using
Publikováno v:
Mathematics
Volume 9
Issue 5
Mathematics, Vol 9, Iss 573, p 573 (2021)
Volume 9
Issue 5
Mathematics, Vol 9, Iss 573, p 573 (2021)
This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem. A recent
Publikováno v:
Security of Ubiquitous Computing Systems ISBN: 9783030105907
The main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main cryptographic features, ultimate hardware performance, an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b8bb46bb12aebc4edec5b9b9307a6e57
https://doi.org/10.1007/978-3-030-10591-4_2
https://doi.org/10.1007/978-3-030-10591-4_2
Publikováno v:
Security of Ubiquitous Computing Systems ISBN: 9783030105907
In this chapter we provide an overview of selected methods for the design and analysis of symmetric encryption algorithms that have recently been published. We start by discussing the practical advantages, limitations and security of the keystream ge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5f15679073ad8541fc444605cc008405
https://doi.org/10.1007/978-3-030-10591-4_3
https://doi.org/10.1007/978-3-030-10591-4_3
Publikováno v:
Electronics
Volume 9
Issue 8
Electronics, Vol 9, Iss 1296, p 1296 (2020)
Volume 9
Issue 8
Electronics, Vol 9, Iss 1296, p 1296 (2020)
We address a class of authentication protocols called &ldquo
HB&rdquo
ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its
HB&rdquo
ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its
Autor:
Miodrag J. Mihaljevic
Publikováno v:
Entropy, Vol 21, Iss 7, p 701 (2019)
Entropy
Volume 21
Issue 7
Entropy
Volume 21
Issue 7
An approach for security enhancement of a class of encryption schemes is pointed out and its security is analyzed. The approach is based on certain results of coding and information theory regarding communication channels with erasures and deletion e
Publikováno v:
IEEE Transactions on Information Forensics and Security. 9:158-168
Randomized encryption techniques, where randomness is used for security enhancement, are considered. We focus on the case where the encrypted data experiences noise, e.g., is transmitted over a noisy channel, within the encoding-encryption paradigm,
Publikováno v:
Mathematical Problems in Engineering, Vol 2016 (2016)
An encryption/decryption approach is proposed dedicated to one-way communication between a transmitter which is a computationally powerful party and a receiver with limited computational capabilities. The proposed encryption technique combines tradit