Showing 241 - 260 results of 262 for search '"cryptographer"', query time: 0.05s Refine Results
  1. 241

    The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field by Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, M. Usman Ashraf

    Published 2022-01-01
    “…For the confusion module, the scheme initially generates <inline-formula> <tex-math notation="LaTeX">$\mathrm {5\times 5}$ </tex-math></inline-formula> bijective S-boxes, which have never been applied in the present literature with good cryptographic properties. The generated S-box is then used parallel in the substitution module, which provides optimum confusion in the cipher data. …”
    Get full text
    Article
  2. 242

    IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions by ZHENG Yonghui, ZHAO Dongliang, GU Chunxiang, ZHANG Xieli

    Published 2024-08-01
    “…A message handler was designed to maintain protocol interaction context information and perform cryptographic operations, thereby supporting testing of the IKE protocol under black-box conditions. …”
    Get full text
    Article
  3. 243

    Physically non-cloneable arbiter-type function with non-linear path pairs by A. A. Ivaniuk, A. Y. Shamyna

    Published 2023-08-01
    “…Physically unclonable functions (PUFs) are basic physical cryptographical primitives, providing to solve tasks such as unclonable identification, digital device authentication and copyright authentication, true random sequence generation, etc. …”
    Get full text
    Article
  4. 244

    Enterprise internal audit data encryption based on blockchain technology. by Lixia Gao

    Published 2025-01-01
    “…The research proposed a framework called "BlockCryptoAudit" to enhance internal audit processes through cryptographic encryption methods and blockchain technology, ensuring secure and transparent audit operations. …”
    Get full text
    Article
  5. 245

    A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR by O. N. Zhdanov, A. V. Sokolov

    Published 2017-05-01
    “…The paper results are valuable for practical use: the development of new constant amplitude codes for MC-CDMA technology, cryptographic primitives, data compression algorithms, signal structures, algorithms of block and stream encryption, based on advanced principles of many-valued logic. …”
    Get full text
    Article
  6. 246

    High speed national secret SM4 optical fiber communication system scheme based on FPGA by Peiyu HUANG, Jiabo SONG, Yangfan JIA

    Published 2023-12-01
    “…With the increasing use of optical fiber communication technology in the Industrial Internet of Things, cryptographic algorithms play a crucial role in ensuring the security of data transmission in embedded device environments.The SM4 packet cipher algorithm, developed independently in our country, is widely applied to wireless LAN and Internet of Things data encryption.However, the software-based encryption and decryption processes are relatively slow, which hampers their application in scenarios requiring high real-time performance, especially for embedded devices.To address this issue, a high-performance and secure optical fiber communication system was designed based on the FPGA platform and the SM4 algorithm.The FPGA was used to implement the MAC layer interface for SM4 algorithm encryption and decryption, as well as data transmission.Besides, an optimization scheme for the hardware implementation architecture of the SM4 algorithm was proposed.The critical path was shortened by employing a pipeline method, thereby improving the system clock frequency.Additionally, parallel processing of S-box transformation was accelerated to enable efficient data replacement.To reduce data reading delays, a dual-cache processing method was combined to facilitate easier processing of cache data and significantly reduce packet loss rates.This scheme greatly enhanced system data throughput.Experimental results demonstrate that compared to similar designs, the throughput of the SM4 algorithm encryption and decryption module in this scheme reaches up to 25.6 Gbit/s, with minimal differences in resource consumption.Due to limitations imposed by the 10-gigabit SFP+ optical module, the throughput of the entire optical fiber communication system reaches 9.4 Gbit/s.For 128-bit data, the average encryption speed is 0.47 μs/bit and the average decryption speed is 0.28 μs/bit, which can be applied to a variety of secure communication scenarios in the internet of things.…”
    Get full text
    Article
  7. 247

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
    Get full text
    Article
  8. 248

    An improved Fully Homomorphic Encryption model based on N-Primes by Mohammed Anwar Mohammed, Fadhil Salman Abed

    Published 2019-10-01
    “…Therefore, the traditional cryptographic schemes cannot be used to process cloud’s data. …”
    Get full text
    Article
  9. 249

    Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools by Muhammad Naveed Abbasi, Abdul Rehman Aslam, Muhammad Awais Bin Altaf, Wala Saadeh

    Published 2025-01-01
    “…The Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as a quantum computing attack-resistant protocol. …”
    Get full text
    Article
  10. 250

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. …”
    Get full text
    Article
  11. 251

    Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies by Salman Ahmed, Nabihah Ahmad, Nasir Ali Shah, Ghulam E. Mustafa Abro, Ardhi Wijayanto, Abdinasir Hirsi, Abdul Rehman Altaf

    Published 2025-01-01
    “…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
    Get full text
    Article
  12. 252

    Effective Partitioning Method With Predictable Hardness for CircuitSAT by Konstantin Chukharev, Irina Gribanova, Dmitry Ivanov, Stepan Kochemazov, Victor Kondratiev, Alexander Semenov

    Published 2025-01-01
    “…We demonstrate the effectiveness of the proposed constructions by applying them to some problems associated with CircuitSAT, in particular, Logical Equivalence Checking benchmarks, Automated Test Pattern Generation benchmarks and the inversion problems of some cryptographic functions.…”
    Get full text
    Article
  13. 253

    Cross-Chain Identity Authentication Method Based on Relay Chain by Qipeng Huang, Minsheng Tan, Wenlong Tian

    Published 2025-01-01
    “…For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. …”
    Get full text
    Article
  14. 254

    Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis by Ramesh Sekaran, Ashok Kumar Munnangi, Manikandan Ramachandran, Mohammad Khishe

    Published 2025-02-01
    “…In order to solve these issues, Cayley–Purser Cryptographic Secured Communication based Jackknife Correlative Data Classification (CPCSC-JCDC) method is designed. …”
    Get full text
    Article
  15. 255

    Linking The Cancer Imaging Archive and GenBank to the National Clinical Cohort Collaborative by Ahmad Baghal, Joel Saltz, Tahsin Kurc, Prateek Prasanna, Samantha Baghal, Janos Hajagos, Erich Bremer, Shaymaa Al‐Shukri, Joshua L. Kennedy, Michael Rutherford, Tracy Nolan, Kirk Smith, Christopher G. Chute, Fred Prior

    Published 2025-01-01
    “…We developed a process to link imaging and genomic variants and N3C EHR data through Privacy Preserving Record Linkage (PPRL) using de‐identified cryptographic hashes to match records associated with the same individuals without using patient identifiers. …”
    Get full text
    Article
  16. 256

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…The integration of BC and SDN supports continuous authentication and monitoring using cryptographic protocols (SHA-256A and RSA-2048) to secure data transmission. …”
    Get full text
    Article
  17. 257

    End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things by Muhammad Shahid Dildar, Adnan Shahid Khan, Irshad Ahmed Abbasi, Reema Shaheen Naseem Akhtar, Khalil Al Ruqaishi, Shakeel Ahmed Ghulam Sarwar

    Published 2025-01-01
    “…In our paper, we proposed some lightweight cryptographic schemes, and Data management overhead which could fit any device. …”
    Get full text
    Article
  18. 258

    STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES by Vladyslav Sharov, Olena Nikulina

    Published 2024-12-01
    “…Exploring quantum error-correction codes and post-quantum cryptographic protocols represents a vital area for future research. …”
    Get full text
    Article
  19. 259

    Optimizing FPGA Resource Allocation for SHA-3 Using DSP48 and Pipelining Techniques by Agfianto Eko Putra, Oskar Natan, Jazi Eko Istiyanto

    Published 2025-01-01
    “…The system's highest frequency is 107.979 MHz, achieving different throughputs for cryptographic hash functions. Specifically, it performs a throughput of 5.183 Gbps for SHA3-224, 4.895 Gbps for SHA3-256, 3.743 Gbps for SHA3-384, and 2.591 Gbps for SHA3-512. …”
    Get full text
    Article
  20. 260

    ILN-YOLOv8: A Lightweight Image Recognition Model for Crimped Wire Connectors by Xiaojian Zhou, Jicheng Kan, Nur Fatin Liyana Mohd Rosely, Xu Duan, Jiajing Cai, Zihan Zhou

    Published 2025-01-01
    “…Additionally, the Efficient Local Attention(ELA) attention mechanism is introduced into the Cryptographic Service Provider(CSP) bottleneck with 2 convolutions(C2F) module in the Backbone, improving feature localization accuracy without increasing network complexity. …”
    Get full text
    Article