-
3921
A Script-Based Cycle-True Verification Framework to Speed-Up Hardware and Software Co-Design: Performance Evaluation on ECC Accelerator Use-Case
Published 2022-11-01“…We demonstrate how the developed framework can be used to speed up the setup of the evaluation flow of an Elliptic-Curve-Cryptography accelerator, performing post-synthesis analyses. …”
Get full text
Article -
3922
On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization
Published 2023-09-01“…Cryptosystem cryptanalysis is regarded as an NP-Hard task in modern cryptography. Due to block ciphers that are part of a modern cipher and have nonlinearity and low autocorrelation in their structure, traditional techniques and brute-force attacks suffer from breaking the key presented in traditional techniques, and brute-force attacks against modern cipher S-AES (simplified-advanced encryption standard) are complex. …”
Get full text
Article -
3923
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing
Published 2020-08-01Get full text
Article -
3924
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
Published 2022-09-01“…Since Picnic is one of the alternate third-round candidates in NIST post-quantum cryptography standardization process, it has become urgent and important to evaluate the security of LowMC in the Picnic setting. …”
Get full text
Article -
3925
Characterization of Ricci Almost Soliton on Lorentzian Manifolds
Published 2023-05-01Get full text
Article -
3926
Enhancing Healthcare Efficacy Through IoT-Edge Fusion: A Novel Approach for Smart Health Monitoring and Diagnosis
Published 2023-01-01“…In our proposed system, patients’ health data is securely managed using a combination of elliptic curve cryptography-based identity-based cryptosystems and edge nodes, ensuring both privacy and integrity. …”
Get full text
Article -
3927
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication
Published 2024-01-01“…Also, we provided how to use our proposed digit-parallel multiplier for post-quantum cryptography algorithms. In addition, we use the proposed digit-parallel multiplier with the square circuit to implement the Itoh-Tsujii inversion algorithm for modular inversion computation; this permits hardware resource minimization. …”
Get full text
Article -
3928
-
3929
RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices
Published 2021-12-01“…Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. …”
Get full text
Article -
3930
A survey on Rijndael based LSB Audio Steganography techniques
Published 2023-12-01“…To safeguard sensitive data, a variety of strategies including steganography, cryptography, and coding have been used. Steganography is a suitable technique that allows the user to hide a message inside of another message (cover media). …”
Get full text
Article -
3931
Review on security risks of key components in industrial control system
Published 2022-06-01Get full text
Article -
3932
An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System
Published 2018-06-01“…The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).…”
Get full text
Article -
3933
Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator
Published 2024-01-01“…Chaotic maps have been widely studied in the field of cryptography for their complex dynamics. However, chaos-based cryptosystems have not been widely used in practice. …”
Get full text
Article -
3934
Elliptic Crypt With Secured Blockchain Assisted Federated Q-Learning Framework for Smart Healthcare
Published 2024-01-01“…Initially, the entered IoMT data is collected from publicly available datasets and encrypted using the Extended Elliptic Curve Cryptography (E_ECurCrypt) technique for ensuring the security. …”
Get full text
Article -
3935
Impact of decreasing polynomial degree in time needed to factor a 100 digits integer by General Number field sieve algorithm
Published 2012-02-01“…Factoring is very important in the field of cryptography, specifically in the Rivest, Shamir, Adleman(RSA) public-key cryptosystem, one of the most prevalent methods for transmitting and receiving secret data which its security relies on the fact that factoring large composite numbers (may be 300 digits) is computationally intensive task . …”
Get full text
Article -
3936
BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
Published 2023-01-01“…In particular, we propose and evaluate a novel blockchain-based secure data exchange (BSDCE-IoV) scheme based on Elliptic Curve Cryptography algorithm. Our solution is designed to eliminate several potential attacks that pose a threat to the IoV environment. …”
Get full text
Article -
3937
A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices
Published 2018-11-01“…The testbed makes use of Transport Layer Security (TLS) 1.2 Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) cipher suites (that comply with the yet to come TLS 1.3 standard requirements), which are evaluated and compared in terms of energy consumption and data throughput for a fog gateway and two mist end devices. …”
Get full text
Article -
3938
Evaluation of statistical properties and cryptographic strength of random sequences obtained by an IBM quantum computer
Published 2023-02-01“…IBM's latest developments in the calibration of qubits and work with quantum errors will bring closer the possibility of their use in cryptography. Therefore, an essential aspect of development in this direction is the potential reduction of the impact of the external environment on quantum computer operation.…”
Get full text
Article -
3939
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022-01-01“…Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. …”
Get full text
Article -
3940
Development and Assessment of SPM: A Sigmoid-Based Model for Probability Estimation in Non-Repetitive Unit Selection With Replacement
Published 2024-01-01“…The study findings can improve decision-making processes in various domains, including statistics, cryptography, machine learning and optimisation, by offering a faster, more adaptable solution for probability estimation in units’ selection with replacement.…”
Get full text
Article