-
221
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. …”
Get full text
Article -
222
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…This deliberate variation contributes to greater non-linearity and confusion, both of which are necessary elements for cryptographic strength. The practical importance of the S-box was further assessed by using a variety of criteria, including nonlinearity, strict avalanche criteria, bit independence criteria, differential probability, and linear approximation probability. …”
Get full text
Article -
223
Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Ord...
Published 2017-01-01“…Moreover, adaptive finite-time synchronization with parameter estimation is applied to achieve synchronization of unidirectional coupled identical fractional-order form of chaotic no equilibrium LRCLSJ models. Finally, a cryptographic encryption scheme with the help of the finite-time synchronization of fractional-order chaotic no equilibrium LRCLSJ models is illustrated through a numerical example, showing that a high level security device can be produced using this system.…”
Get full text
Article -
224
Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology
Published 2025-01-01“…Our implementation on resource-constrained IoT devices demonstrates the feasibility of this approach, highlighting significant improvements in transaction efficiency, real-time data exchange, and cryptographic key management. Furthermore, this research aligns with Web 3.0 principles, emphasizing decentralization, user autonomy, and data sovereignty. …”
Get full text
Article -
225
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. …”
Get full text
Article -
226
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01“…This research realizes the semantic security of outsourced data, which can efficiently and comprehensively carry out cryptographic retrieval based on keyword sorting.…”
Get full text
Article -
227
Lightweight Block and Stream Cipher Algorithm: A Review
Published 2024-06-01“…Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. …”
Get full text
Article -
228
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01“…The increasing demand for secure and efficient encryption algorithms has intensified the exploration of alternative cryptographic solutions, including biologically inspired systems like cellular automata. …”
Get full text
Article -
229
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Methods/Analysis involve a novel combination of Advanced Encryption Standard (AES) and quantum cryptographic algorithms CRYSTALS-Dilithium and CRYSTALS-Kyber within a hybrid blockchain architecture to secure EHRs. …”
Get full text
Article -
230
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01“…However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. …”
Get full text
Article -
231
Efficient Learning of Quantum States Prepared With Few Fermionic Non-Gaussian Gates
Published 2025-01-01“…We also show that, if t scales slightly more than logarithmically, any learning algorithm to solve the same task must be inefficient, under common cryptographic assumptions. We also provide an efficient property-testing algorithm that, given access to copies of a state, determines whether such a state is far or close to the set of states for which our learning algorithm works. …”
Get full text
Article -
232
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
233
Secure Two-Party Decision Tree Classification Based on Function Secret Sharing
Published 2023-01-01“…The comparison protocol leverages FSS to securely compare attribute values to node thresholds for tree traversal, reducing overhead through efficient cryptographic techniques. Our framework divides computation between two servers holding private data. …”
Get full text
Article -
234
IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing
Published 2015-01-01“…As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. …”
Get full text
Article -
235
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
Published 2020-01-01“…Here, we propose the integration of TPM in IOT computing to performs cryptographic operations and provide hardware-based security. …”
Get full text
Article -
236
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
Get full text
Article -
237
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. Lightweight cryptographic algorithms have emerged to address these challenges, with ASCON gaining recognition for its robustness and efficiency. …”
Get full text
Article -
238
A Survey on True Random Number Generators Based on Chaos
Published 2019-01-01“…Random numbers are used in many cryptographic protocols, key management, identity authentication, image encryption, and so on. …”
Get full text
Article -
239
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01“…Then, their chaotic behavior is evaluated with cryptographic metrics.…”
Get full text
Article -
240
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01“…By leveraging lightweight cryptographic mechanisms such as hash functions, quadratic residuosity, and Legendre symbols, the proposed scheme ensures secure authentication, group key sharing, and pseudonym management within IoV networks. …”
Get full text
Article