Showing 3,921 - 3,940 results of 4,079 for search '"cryptography"', query time: 0.09s Refine Results
  1. 3921

    A Script-Based Cycle-True Verification Framework to Speed-Up Hardware and Software Co-Design: Performance Evaluation on ECC Accelerator Use-Case by Luca Zulberti, Stefano Di Matteo, Pietro Nannipieri, Sergio Saponara, Luca Fanucci

    Published 2022-11-01
    “…We demonstrate how the developed framework can be used to speed up the setup of the evaluation flow of an Elliptic-Curve-Cryptography accelerator, performing post-synthesis analyses. …”
    Get full text
    Article
  2. 3922

    On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization by Rizk M. Rizk-Allah, Hatem Abdulkader, Samah S. Abd Elatif, Diego Oliva, Guillermo Sosa-Gómez, Václav Snášel

    Published 2023-09-01
    “…Cryptosystem cryptanalysis is regarded as an NP-Hard task in modern cryptography. Due to block ciphers that are part of a modern cipher and have nonlinearity and low autocorrelation in their structure, traditional techniques and brute-force attacks suffer from breaking the key presented in traditional techniques, and brute-force attacks against modern cipher S-AES (simplified-advanced encryption standard) are complex. …”
    Get full text
    Article
  3. 3923
  4. 3924

    New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting by Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe

    Published 2022-09-01
    “…Since Picnic is one of the alternate third-round candidates in NIST post-quantum cryptography standardization process, it has become urgent and important to evaluate the security of LowMC in the Picnic setting. …”
    Get full text
    Article
  5. 3925
  6. 3926

    Enhancing Healthcare Efficacy Through IoT-Edge Fusion: A Novel Approach for Smart Health Monitoring and Diagnosis by Muhammad Izhar, Syed Asad Ali Naqvi, Adeel Ahmed, Saima Abdullah, Nazik Alturki, Leila Jamel

    Published 2023-01-01
    “…In our proposed system, patients’ health data is securely managed using a combination of elliptic curve cryptography-based identity-based cryptosystems and edge nodes, ensuring both privacy and integrity. …”
    Get full text
    Article
  7. 3927

    DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication by Adel R. Alharbi, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Amer Aljaedi, Abdullah Aljuhni, Dalal J. Alanazi

    Published 2024-01-01
    “…Also, we provided how to use our proposed digit-parallel multiplier for post-quantum cryptography algorithms. In addition, we use the proposed digit-parallel multiplier with the square circuit to implement the Itoh-Tsujii inversion algorithm for modular inversion computation; this permits hardware resource minimization. …”
    Get full text
    Article
  8. 3928
  9. 3929

    RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices by Zhao Huang, Liang Li, Yin Chen, Zeyu Li, Quan Wang, Xiaohong Jiang

    Published 2021-12-01
    “…Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. …”
    Get full text
    Article
  10. 3930

    A survey on Rijndael based LSB Audio Steganography techniques by sajaa g.mohammed

    Published 2023-12-01
    “…To safeguard sensitive data, a variety of strategies including steganography, cryptography, and coding have been used. Steganography is a suitable technique that allows the user to hide a message inside of another message (cover media). …”
    Get full text
    Article
  11. 3931
  12. 3932

    An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System by Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, Jung Taek Seo

    Published 2018-06-01
    “…The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).…”
    Get full text
    Article
  13. 3933

    Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator by Wenbo Zhao, Caochuan Ma

    Published 2024-01-01
    “…Chaotic maps have been widely studied in the field of cryptography for their complex dynamics. However, chaos-based cryptosystems have not been widely used in practice. …”
    Get full text
    Article
  14. 3934

    Elliptic Crypt With Secured Blockchain Assisted Federated Q-Learning Framework for Smart Healthcare by Sudhakaran Gajendran, Revathi Muthusamy, Krithiga Ravi, Omkumar Chandraumakantham, Suguna Marappan

    Published 2024-01-01
    “…Initially, the entered IoMT data is collected from publicly available datasets and encrypted using the Extended Elliptic Curve Cryptography (E_ECurCrypt) technique for ensuring the security. …”
    Get full text
    Article
  15. 3935

    Impact of decreasing polynomial degree in time needed to factor a 100 digits integer by General Number field sieve algorithm by Jamal A. Othman

    Published 2012-02-01
    “…Factoring is very important in the field of cryptography, specifically in the Rivest, Shamir, Adleman(RSA) public-key cryptosystem, one of the most prevalent methods for transmitting and receiving secret data which its security relies on the fact that factoring large composite numbers (may be 300 digits) is computationally intensive task . …”
    Get full text
    Article
  16. 3936

    BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment by Sulaiman M. Karim, Adib Habbal, Shehzad Ashraf Chaudhry, Azeem Irshad

    Published 2023-01-01
    “…In particular, we propose and evaluate a novel blockchain-based secure data exchange (BSDCE-IoV) scheme based on Elliptic Curve Cryptography algorithm. Our solution is designed to eliminate several potential attacks that pose a threat to the IoV environment. …”
    Get full text
    Article
  17. 3937

    A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices by Manuel Suárez-Albela, Paula Fraga-Lamas, Tiago M. Fernández-Caramés

    Published 2018-11-01
    “…The testbed makes use of Transport Layer Security (TLS) 1.2 Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) cipher suites (that comply with the yet to come TLS 1.3 standard requirements), which are evaluated and compared in terms of energy consumption and data throughput for a fog gateway and two mist end devices. …”
    Get full text
    Article
  18. 3938

    Evaluation of statistical properties and cryptographic strength of random sequences obtained by an IBM quantum computer by Mikhail A. Orlov, Kirill A. Nechaev, Sergey A. Reznichenko

    Published 2023-02-01
    “…IBM's latest developments in the calibration of qubits and work with quantum errors will bring closer the possibility of their use in cryptography. Therefore, an essential aspect of development in this direction is the potential reduction of the impact of the external environment on quantum computer operation.…”
    Get full text
    Article
  19. 3939

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba, Makhlouf Derdour, Mohamed Amine Ferrag, S. M. Muyeen, Mohamed Benbouzid

    Published 2022-01-01
    “…Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. …”
    Get full text
    Article
  20. 3940

    Development and Assessment of SPM: A Sigmoid-Based Model for Probability Estimation in Non-Repetitive Unit Selection With Replacement by Samarth Godara, G. Avinash, Rajender Parsad, Sudeep Marwaha, Mukhtar Ahmad Faiz, Ram Swaroop Bana

    Published 2024-01-01
    “…The study findings can improve decision-making processes in various domains, including statistics, cryptography, machine learning and optimisation, by offering a faster, more adaptable solution for probability estimation in units’ selection with replacement.…”
    Get full text
    Article