Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Yeajun Kang"'
Publikováno v:
Applied Sciences, Vol 14, Iss 18, p 8394 (2024)
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat
Externí odkaz:
https://doaj.org/article/aef9762b91a045daa95208c2a2eaf8a7
Publikováno v:
Entropy, Vol 25, Iss 7, p 986 (2023)
With the development of artificial intelligence, deep-learning-based cryptanalysis has been actively studied. There are many cryptanalysis techniques. Among them, cryptanalysis was performed to recover the secret key used for cryptography encryption
Externí odkaz:
https://doaj.org/article/e44de7bb3614473cbd7f114ec3452c3a
Publikováno v:
Sensors, Vol 23, Iss 12, p 5683 (2023)
As IoT technology develops, many sensor devices are being used in our life. To protect such sensor data, lightweight block cipher techniques such as SPECK-32 are applied. However, attack techniques for these lightweight ciphers are also being studied
Externí odkaz:
https://doaj.org/article/e9431fb815b64d6b8643e44f9914e364
Publikováno v:
Sensors, Vol 23, Iss 6, p 3156 (2023)
The Shor’s algorithm can find solutions to the discrete logarithm problem on binary elliptic curves in polynomial time. A major challenge in implementing Shor’s algorithm is the overhead of representing and performing arithmetic on binary ellipti
Externí odkaz:
https://doaj.org/article/98821a5a33fc40ed9e20c9522af39b9b
Publikováno v:
Applied Sciences, Vol 12, Iss 21, p 11109 (2022)
The deep voice detection technology currently being researched causes personal information leakage because the input voice data are stored in the detection server. To overcome this problem, in this paper, we propose a novel system (i.e., DeepDetectio
Externí odkaz:
https://doaj.org/article/4ba4ebfb95f34271a17d2c8b5dd9e523
Publikováno v:
Entropy; Volume 25; Issue 7; Pages: 986
With the development of artificial intelligence, deep-learning-based cryptanalysis has been actively studied. There are many cryptanalysis techniques. Among them, cryptanalysis was performed to recover the secret key used for cryptography encryption
Publikováno v:
Sensors; Volume 23; Issue 12; Pages: 5683
As IoT technology develops, many sensor devices are being used in our life. To protect such sensor data, lightweight block cipher techniques such as SPECK-32 are applied. However, attack techniques for these lightweight ciphers are also being studied
Publikováno v:
Information Security Applications ISBN: 9783031256585
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79c0bcf954547cc0043afc4e56bd65ed
https://doi.org/10.1007/978-3-031-25659-2_18
https://doi.org/10.1007/978-3-031-25659-2_18