Showing 221 - 240 results of 262 for search '"cryptographer"', query time: 0.05s Refine Results
  1. 221

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. …”
    Get full text
    Article
  2. 222

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…This deliberate variation contributes to greater non-linearity and confusion, both of which are necessary elements for cryptographic strength. The practical importance of the S-box was further assessed by using a variety of criteria, including nonlinearity, strict avalanche criteria, bit independence criteria, differential probability, and linear approximation probability. …”
    Get full text
    Article
  3. 223

    Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Ord... by Sifeu Takougang Kingni, Gaetan Fautso Kuiate, Romanic Kengne, Robert Tchitnga, Paul Woafo

    Published 2017-01-01
    “…Moreover, adaptive finite-time synchronization with parameter estimation is applied to achieve synchronization of unidirectional coupled identical fractional-order form of chaotic no equilibrium LRCLSJ models. Finally, a cryptographic encryption scheme with the help of the finite-time synchronization of fractional-order chaotic no equilibrium LRCLSJ models is illustrated through a numerical example, showing that a high level security device can be produced using this system.…”
    Get full text
    Article
  4. 224

    Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology by Tamai Ramírez-Gordillo, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López, Higinio Mora

    Published 2025-01-01
    “…Our implementation on resource-constrained IoT devices demonstrates the feasibility of this approach, highlighting significant improvements in transaction efficiency, real-time data exchange, and cryptographic key management. Furthermore, this research aligns with Web 3.0 principles, emphasizing decentralization, user autonomy, and data sovereignty. …”
    Get full text
    Article
  5. 225

    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim

    Published 2020-01-01
    “…Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. …”
    Get full text
    Article
  6. 226

    Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm by Demei Mao, Mingzhu Wang

    Published 2025-12-01
    “…This research realizes the semantic security of outsourced data, which can efficiently and comprehensively carry out cryptographic retrieval based on keyword sorting.…”
    Get full text
    Article
  7. 227

    Lightweight Block and Stream Cipher Algorithm: A Review by Suaad Ali Abead, Nada Hussein M. Ali

    Published 2024-06-01
    “…Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. …”
    Get full text
    Article
  8. 228

    Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata by George Cosmin Stănică, Petre Anghelescu

    Published 2025-01-01
    “…The increasing demand for secure and efficient encryption algorithms has intensified the exploration of alternative cryptographic solutions, including biologically inspired systems like cellular automata. …”
    Get full text
    Article
  9. 229

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Methods/Analysis involve a novel combination of Advanced Encryption Standard (AES) and quantum cryptographic algorithms CRYSTALS-Dilithium and CRYSTALS-Kyber within a hybrid blockchain architecture to secure EHRs. …”
    Get full text
    Article
  10. 230

    An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) by Kisakye Diana Michelle, Ocen Gilbert Gilibrays, Odongtoo Godfrey

    Published 2024-12-01
    “…However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. …”
    Get full text
    Article
  11. 231

    Efficient Learning of Quantum States Prepared With Few Fermionic Non-Gaussian Gates by Antonio Anna Mele, Yaroslav Herasymenko

    Published 2025-01-01
    “…We also show that, if t scales slightly more than logarithmically, any learning algorithm to solve the same task must be inefficient, under common cryptographic assumptions. We also provide an efficient property-testing algorithm that, given access to copies of a state, determines whether such a state is far or close to the set of states for which our learning algorithm works. …”
    Get full text
    Article
  12. 232

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article
  13. 233

    Secure Two-Party Decision Tree Classification Based on Function Secret Sharing by Kun Liu, Chunming Tang

    Published 2023-01-01
    “…The comparison protocol leverages FSS to securely compare attribute values to node thresholds for tree traversal, reducing overhead through efficient cryptographic techniques. Our framework divides computation between two servers holding private data. …”
    Get full text
    Article
  14. 234

    IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing by Aymen Abdullah Alsaffar, Young-Rok Shin, Eui-Nam Huh

    Published 2015-01-01
    “…As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. …”
    Get full text
    Article
  15. 235

    Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim

    Published 2020-01-01
    “…Here, we propose the integration of TPM in IOT computing to performs cryptographic operations and provide hardware-based security. …”
    Get full text
    Article
  16. 236

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
    Get full text
    Article
  17. 237

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. Lightweight cryptographic algorithms have emerged to address these challenges, with ASCON gaining recognition for its robustness and efficiency. …”
    Get full text
    Article
  18. 238

    A Survey on True Random Number Generators Based on Chaos by Fei Yu, Lixiang Li, Qiang Tang, Shuo Cai, Yun Song, Quan Xu

    Published 2019-01-01
    “…Random numbers are used in many cryptographic protocols, key management, identity authentication, image encryption, and so on. …”
    Get full text
    Article
  19. 239
  20. 240

    Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks by Sujash Naskar, Gerhard Hancke, Tingting Zhang, Mikael Gidlund

    Published 2025-01-01
    “…By leveraging lightweight cryptographic mechanisms such as hash functions, quadratic residuosity, and Legendre symbols, the proposed scheme ensures secure authentication, group key sharing, and pseudonym management within IoV networks. …”
    Get full text
    Article