A new security architecture for SIP based P2P computer networks [PDF]
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core
Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer
Private Set Intersection (PSI) is a fundamental cryptographic primitive in privacy-preserving computation and has been widely applied in federated learning, secure data sharing, and privacy-aware data analytics.
Zhibo Guan +7 more
doaj +1 more source
A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah +4 more
doaj +1 more source
Efficient Length Doubling From Tweakable Block Ciphers
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n − 1].
Yu Long Chen +3 more
doaj +1 more source
On some quasigroup cryptographical primitives
11 ...
Piroska Csörgö, Victor A. Shcherbacov
openaire +2 more sources
Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Carmen Camara +3 more
doaj +1 more source
THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core
On the composable security of weak coin flipping [PDF]
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu +3 more
doaj +1 more source
A European Call for Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation [PDF]
Joos Vandewalle +5 more
openalex +1 more source
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The
A. Beletsky, D. Stecenko
doaj

