Results 1 to 10 of about 172 (89)

MALWARE ANALYSIS AND STATIC CALL GRAPH GENERATION WITH RADARE2 [PDF]

open access: yesStudia Universitatis Babeș-Bolyai Informatica, 2023
A powerful feature used in automated malware analysis is the static call graph of the executable file. Elimination of sandbox environment, fast scan, function call patterns beyond instruction level information – all of these motivate the prevalence of ...
MESTER, Attila
core   +3 more sources

A construction of encryption protocols over some semidirect products

open access: yesJournal of Mathematical Cryptology, 2023
In CANDARW ’18, Isobe et al. proposed a secure encryption protocol on non-abelian groups based on the Anshel–Anshel–Goldfeld key exchange protocol. There have remained two weak points on the protocol: one is that the protocol is indistinguishable against
Isobe Shuji, Koizumi Eisuke
doaj   +1 more source

The mF mode of authenticated encryption with associated data

open access: yesJournal of Mathematical Cryptology, 2022
In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption.
Chakraborty Bishwajit, Nandi Mridul
doaj   +1 more source

On density estimation at a fixed point under local differential privacy

open access: yes, 2021
We consider non-parametric density estimation in the framework of local, both pure and approximate, differential privacy. In contrast to centralized privacy scenarios with a trusted curator, in the local setup anonymization must be guaranteed already on ...
M. Kröll
semanticscholar   +1 more source

Accountable multi-authority attribute-based data access control in smart grids

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The developments of AI, information security and network technology have improved the security, efficiency of the smart grid system. However real-time data and consume data sharing make privacy leakage, malicious entities and users be uncontrollable ...
Leyou Zhang   +3 more
doaj   +1 more source

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

Cryptanalysis of ITRU [PDF]

open access: yes, 2021
ITRU cryptosystem is a public key cryptosystem and one of the known variants of NTRU cryptosystem. Instead of working in a truncated polynomial ring, ITRU cryptosystem is based on the ring of integers.
Hashim, Hayder R.   +2 more
core   +3 more sources

Efficiently Processing Complex-Valued Data in Homomorphic Encryption

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a new homomorphic encryption scheme that is natively capable of computing with complex numbers. This is done by generalizing recent work of Chen, Laine, Player and Xia, who modified the Fan–Vercauteren scheme by replacing the integral ...
Bootland Carl   +3 more
doaj   +1 more source

Group key management based on semigroup actions [PDF]

open access: yes, 2016
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way.
Lopez-Ramos, Juan Antonio   +3 more
core   +1 more source

New approach to practical leakage-resilient public-key cryptography

open access: yesJournal of Mathematical Cryptology, 2020
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols.
Chakraborty Suvradip   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy