Results 31 to 40 of about 1,355 (213)

PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They can be found in critical infrastructures like power grids, water systems, nuclear plants, manufacturing systems, etc.
Zheng Yang   +4 more
doaj   +1 more source

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar   +4 more
doaj   +1 more source

Uncloneable Cryptographic Primitives with Interaction

open access: yes, 2023
44 pages, 3 ...
Broadbent, Anne, Culf, Eric
openaire   +2 more sources

Breaking universal limitations on quantum conference key agreement without quantum memory

open access: yesCommunications Physics, 2023
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in ...
Chen-Long Li   +7 more
doaj   +1 more source

Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 1, January 2026.
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley   +1 more source

Optimization of Additive Fibonacci Generators Based on Primitive Polynomials Over GF(p)

open access: yesIEEE Access
This paper presents an approach to the modification of the additive Fibonacci generator by implementing it based on primitive polynomials over the field GF(p).
Pawel Sawicki   +7 more
doaj   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)

open access: yesJournal of Mathematical Cryptology, 2020
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a ...
Crescenzo Giovanni Di   +3 more
doaj   +1 more source

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, Volume 35, Issue 52, December 23, 2025.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

Variable Bit Permutations: Linear Characteristics and Pure VBP-Based Cipher [PDF]

open access: yesComputer Science Journal of Moldova, 2005
This paper describes linear characteristics of the variable bit permutations (VBP) that are used in the form of the data-dependent permutations. This primitive suites well to the design of fast cheap-hardware-oriented ciphers. Because of the existence of
N.A. Moldovyan   +2 more
doaj  

Home - About - Disclaimer - Privacy