Results 131 to 140 of about 35,343 (264)

THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]

open access: yes
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core  

Automated detection and classification of cryptographic algorithms in binary programs through machine learning [PDF]

open access: yesarXiv, 2015
Threats from the internet, particularly malicious software (i.e., malware) often use cryptographic algorithms to disguise their actions and even to take control of a victim's system (as in the case of ransomware). Malware and other threats proliferate too quickly for the time-consuming traditional methods of binary analysis to be effective.
arxiv  

A new semiring and its cryptographic applications

open access: yesAIMS Mathematics
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums.
Huawei Huang   +3 more
doaj   +1 more source

Semi-automatic verification of cryptographic primitives [PDF]

open access: yes, 2012
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptographic proofs in the Coq proof assistant. CertiCrypt instruments the code-based game-based approach to cryptographic proofs, and builds upon many areas, including probability and complexity theory, algebra, semantics of programming languages, and program ...
openaire   +2 more sources

Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection

open access: yesJournal of Mathematical Cryptology
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj   +1 more source

Towards A Correct Usage of Cryptography in Semantic Watermarks for Diffusion Models [PDF]

open access: yesarXiv
Semantic watermarking methods enable the direct integration of watermarks into the generation process of latent diffusion models by only modifying the initial latent noise. One line of approaches building on Gaussian Shading relies on cryptographic primitives to steer the sampling process of the latent noise.
arxiv  

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware

open access: bronze, 2010
Stéphane Badel   +7 more
openalex   +1 more source

Tightly Secure Public Key Encryption With Equality Test in Setting With Adaptive Corruptions

open access: yesIEEE Access
Public Key Encryption with Equality Test (PKEET) is a cryptographic primitive that allows an authorized entity to test whether two given ciphertexts are the encryption of the same message without decrypting them.
Yunhao Ling
doaj   +1 more source

Highly-Secure Physically Unclonable Cryptographic Primitives Using Nonlinear Conductance and Analog State Tuning in Memristive Crossbar Arrays

open access: green, 2016
Hussein Nili   +6 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy