Showing 201 - 220 results of 4,223 for search '"cryptographer"', query time: 0.20s Refine Results
  1. 201

    The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms by Paulo Martins, Leonel Sousa

    Published 2020-01-01
    “…We hope this work sows the seed of further research on the application of non-positional number arithmetic to other cryptographic use-cases.…”
    Get full text
    Article
  2. 202

    Radio Frequency Public Key Generator for Digital Cryptographic Application by Jusung Kang, Young-Sik Kim, Heung-No Lee

    Published 2023-01-01
    “…In this research, we introduce a novel RF-based Public Key Generator (RF-PubKG) model that maps RF features into cryptographic sequences by incorporating a Key Generation (KeyGen) layer into the RFF model. …”
    Get full text
    Article
  3. 203

    HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW by Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohammed Ahmed Saleh, Habibah Hashim

    Published 2020-06-01
    “…Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. …”
    Get full text
    Article
  4. 204
  5. 205

    Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions by Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, Jordan Wright

    Published 2021-03-01
    “…In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. …”
    Get full text
    Article
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210

    Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector by Francisco Alonso, Benjamín Samaniego, Gonzalo Farias, Sebastián Dormido-Canto

    Published 2024-03-01
    “…This article presents a study on the cryptographic algorithms ChaCha20 and Poly1305. The purpose of the study is to experimentally verify their adaptation to the strict time requirements that GOOSE must meet for their operation. …”
    Get full text
    Article
  11. 211
  12. 212
  13. 213
  14. 214
  15. 215
  16. 216

    Differential Analysis of a Cryptographic Hashing Algorithm HBC-256 by Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva, Dilmukhanbet Dyusenbayev

    Published 2022-10-01
    “…The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorithm requires careful research process in order to confirm its cryptographic properties, namely: pre-image resistance and resistance to collisions of the first and second order. …”
    Get full text
    Article
  17. 217
  18. 218

    Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms by Władysław Dudzic, Krzysztof Kanciak

    Published 2020-09-01
    “…A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. …”
    Get full text
    Article
  19. 219
  20. 220

    VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS by Nadezhda S. Mogilevskaya, Sergey S. Kolchanov

    Published 2011-11-01
    “…The possibility of using colored Petri nets for the analysis of key distribution cryptographic protocols as an example of symmetric Needham—Schroeder protocol is reviewed and evaluated.…”
    Get full text
    Article