-
201
The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms
Published 2020-01-01“…We hope this work sows the seed of further research on the application of non-positional number arithmetic to other cryptographic use-cases.…”
Get full text
Article -
202
Radio Frequency Public Key Generator for Digital Cryptographic Application
Published 2023-01-01“…In this research, we introduce a novel RF-based Public Key Generator (RF-PubKG) model that maps RF features into cryptographic sequences by incorporating a Key Generation (KeyGen) layer into the RFF model. …”
Get full text
Article -
203
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
Published 2020-06-01“…Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. …”
Get full text
Article -
204
Evaluation of cryptographic primitives security based on proximity to the Latin square
Published 2016-04-01Subjects: “…cryptographic…”
Get full text
Article -
205
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Published 2021-03-01“…In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. …”
Get full text
Article -
206
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
Published 2021-10-01Get full text
Article -
207
Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata
Published 2023-03-01Get full text
Article -
208
Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology
Published 2023-06-01Subjects: Get full text
Article -
209
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01Subjects: Get full text
Article -
210
Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector
Published 2024-03-01“…This article presents a study on the cryptographic algorithms ChaCha20 and Poly1305. The purpose of the study is to experimentally verify their adaptation to the strict time requirements that GOOSE must meet for their operation. …”
Get full text
Article -
211
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
Published 2023-01-01Get full text
Article -
212
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
Published 2023-05-01Subjects: Get full text
Article -
213
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
Published 2014-05-01Subjects: Get full text
Article -
214
Personal authentication and cryptographic key generation based on electroencephalographic signals
Published 2023-05-01Subjects: Get full text
Article -
215
A Finite State Machine-Based Improved Cryptographic Technique
Published 2023-05-01Subjects: “…Modified Cryptographic Turbo Code…”
Get full text
Article -
216
Differential Analysis of a Cryptographic Hashing Algorithm HBC-256
Published 2022-10-01“…The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorithm requires careful research process in order to confirm its cryptographic properties, namely: pre-image resistance and resistance to collisions of the first and second order. …”
Get full text
Article -
217
Technique for Searching Data in a Cryptographically Protected SQL Database
Published 2023-10-01Get full text
Article -
218
Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms
Published 2020-09-01“…A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. …”
Get full text
Article -
219
Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
Published 2023-01-01Subjects: “…cryptographic protocol…”
Get full text
Article -
220
VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS
Published 2011-11-01“…The possibility of using colored Petri nets for the analysis of key distribution cryptographic protocols as an example of symmetric Needham—Schroeder protocol is reviewed and evaluated.…”
Get full text
Article