Results 131 to 140 of about 35,343 (264)
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
openalex +2 more sources
THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core
Automated detection and classification of cryptographic algorithms in binary programs through machine learning [PDF]
Threats from the internet, particularly malicious software (i.e., malware) often use cryptographic algorithms to disguise their actions and even to take control of a victim's system (as in the case of ransomware). Malware and other threats proliferate too quickly for the time-consuming traditional methods of binary analysis to be effective.
arxiv
A new semiring and its cryptographic applications
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums.
Huawei Huang+3 more
doaj +1 more source
Semi-automatic verification of cryptographic primitives [PDF]
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptographic proofs in the Coq proof assistant. CertiCrypt instruments the code-based game-based approach to cryptographic proofs, and builds upon many areas, including probability and complexity theory, algebra, semantics of programming languages, and program ...
openaire +2 more sources
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj +1 more source
Towards A Correct Usage of Cryptography in Semantic Watermarks for Diffusion Models [PDF]
Semantic watermarking methods enable the direct integration of watermarks into the generation process of latent diffusion models by only modifying the initial latent noise. One line of approaches building on Gaussian Shading relies on cryptographic primitives to steer the sampling process of the latent noise.
arxiv
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
Stéphane Badel+7 more
openalex +1 more source
Tightly Secure Public Key Encryption With Equality Test in Setting With Adaptive Corruptions
Public Key Encryption with Equality Test (PKEET) is a cryptographic primitive that allows an authorized entity to test whether two given ciphertexts are the encryption of the same message without decrypting them.
Yunhao Ling
doaj +1 more source