Results 31 to 40 of about 1,355 (213)
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They can be found in critical infrastructures like power grids, water systems, nuclear plants, manufacturing systems, etc.
Zheng Yang +4 more
doaj +1 more source
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar +4 more
doaj +1 more source
Uncloneable Cryptographic Primitives with Interaction
44 pages, 3 ...
Broadbent, Anne, Culf, Eric
openaire +2 more sources
Breaking universal limitations on quantum conference key agreement without quantum memory
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in ...
Chen-Long Li +7 more
doaj +1 more source
Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley +1 more source
Optimization of Additive Fibonacci Generators Based on Primitive Polynomials Over GF(p)
This paper presents an approach to the modification of the additive Fibonacci generator by implementing it based on primitive polynomials over the field GF(p).
Pawel Sawicki +7 more
doaj +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a ...
Crescenzo Giovanni Di +3 more
doaj +1 more source
Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni +6 more
wiley +1 more source
Variable Bit Permutations: Linear Characteristics and Pure VBP-Based Cipher [PDF]
This paper describes linear characteristics of the variable bit permutations (VBP) that are used in the form of the data-dependent permutations. This primitive suites well to the design of fast cheap-hardware-oriented ciphers. Because of the existence of
N.A. Moldovyan +2 more
doaj

