Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Sokjoon Lee"'
Publikováno v:
IET Information Security, Vol 17, Iss 1, Pp 46-65 (2023)
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic alg
Externí odkaz:
https://doaj.org/article/03c85d90ac7d499ab8eeac6436dc1856
Publikováno v:
Sensors, Vol 23, Iss 8, p 3835 (2023)
Driver distraction is considered a main cause of road accidents, every year, thousands of people obtain serious injuries, and most of them lose their lives. In addition, a continuous increase can be found in road accidents due to driver’s distracti
Externí odkaz:
https://doaj.org/article/aa796984b67146c6a329bd065f84f93f
Publikováno v:
Applied Sciences, Vol 12, Iss 20, p 10192 (2022)
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of data are being created and communicated in IoT networks. Block ciphers are being used to protect these data from malicious attacks. Massive computation
Externí odkaz:
https://doaj.org/article/f04f9909786b4ac0a54e8bd2a0c459a5
Publikováno v:
Applied Sciences, Vol 11, Iss 7, p 2949 (2021)
Addition is the most basic operation of computing based on a bit system. There are various addition algorithms considering multiple number systems and hardware, and studies for a more efficient addition are still ongoing. Quantum computing based on q
Externí odkaz:
https://doaj.org/article/5873d87a189c47088e5bd229af0ec8db
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 44:8425-8436
Topological indices and coindices are numerical invariants that relate to quantitative structure property/activity connections. The purpose of topological indices and coindices were introduced to draw the data related to chemical graphs with respect
Publikováno v:
Computer Modeling in Engineering & Sciences. 137:939-964
Publikováno v:
IET Information Security. 17:46-65
Publikováno v:
Information Security and Cryptology – ICISC 2021 ISBN: 9783031088957
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::64d50fea4e0eaf5f891976aeec2143d6
https://doi.org/10.1007/978-3-031-08896-4_20
https://doi.org/10.1007/978-3-031-08896-4_20
Publikováno v:
ACM Transactions on Embedded Computing Systems. 18:1-13
Elliptic Curve Cryptography (ECC) now is one of the most important approach to instantiate asymmetric encryption and signature schemes, which has been extensively exploited to protect the security of cyber-physical systems. With the advent of the Int
Publikováno v:
The Journal of Supercomputing. 75:4329-4349
Since the advent of deep belief network deep learning technology in 2006, artificial intelligence technology has been utilized in various convergence areas, such as autonomous driving and medical care. Some services requiring fast decision making and