Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Panos Kampanakis"'
Autor:
Panos Kampanakis, Tancrède Lepoint
Publikováno v:
Security Standardisation Research ISBN: 9783031307300
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::544daf48507c649e62c1a40ad167f525
https://doi.org/10.1007/978-3-031-30731-7_4
https://doi.org/10.1007/978-3-031-30731-7_4
Autor:
Panos Kampanakis, Michael Kallitsis
Publikováno v:
Cyber Security, Cryptology, and Machine Learning ISBN: 9783031076886
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c30b2cdb2816336ef4a759e9acb97562
https://doi.org/10.1007/978-3-031-07689-3_25
https://doi.org/10.1007/978-3-031-07689-3_25
Publikováno v:
Silicon Valley Cybersecurity Conference ISBN: 9783030727246
The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to solve (elliptic curve) discrete logarithm and integer factorization problems in polynomial time. All c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::990b491caefb7c1700cea807623ebc2f
https://doi.org/10.1007/978-3-030-72725-3_5
https://doi.org/10.1007/978-3-030-72725-3_5
Publikováno v:
CoNEXT
The advances in quantum computing present a threat to public key primitives due to their ability to solve hard cryptographic problems in polynomial time. To address this threat to critical Internet security protocols like the Transfer Layer Security
The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. IKEv2 is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::51c59f4412fdb8f02c50b83fe18dff94
https://doi.org/10.17487/rfc8784
https://doi.org/10.17487/rfc8784
Autor:
Quynh Dang, Panos Kampanakis
This document updates the "Cryptographic Message Syntax Algorithms" (RFC3370) and describes the conventions for using the SHAKE family of hash functions in the Cryptographic Message Syntax as one-way hash functions with the RSA Probabilistic signatur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1e475cca0df5cd8f608d6f06d4d4d384
https://doi.org/10.17487/rfc8702
https://doi.org/10.17487/rfc8702
Publikováno v:
NDSS
Autor:
Quynh Dang, Panos Kampanakis
Digital signatures are used to sign messages, X.509 certificates and CRLs. This document updates the "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List Profile" (RFC3279) and descr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba2f4d82e40472c7012351f8e443feb0
https://doi.org/10.17487/rfc8692
https://doi.org/10.17487/rfc8692
Autor:
Attila A. Yavuz, Panos Kampanakis
Publikováno v:
Security and Communication Networks. 8:3180-3190
Audit logs provide information about historical states of computer systems. They also contain highly valuable data that can be used by law enforcement in forensic investigations. Thus, ensuring the authenticity and integrity of audit logs is of vital
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow's threats, wherever they appear. Now, three Cisco