Results 121 to 130 of about 1,926,564 (269)

Measuring Crypto Literacy

open access: yesJournal of Consumer Affairs, Volume 59, Issue 4, Winter 2025.
ABSTRACT We present the construction and validation of a scale for measuring cryptocurrency knowledge. As users continue to adopt digital currencies and government agencies introduce more regulatory legislation, researchers need to understand the general public's degree of literacy in this area.
Michael Jones   +2 more
wiley   +1 more source

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +1 more source

Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 25-26, 30 November 2025.
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque   +4 more
wiley   +1 more source

Enhancing the SRAM PUF with an XOR Gate

open access: yesApplied Sciences
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard   +2 more
doaj   +1 more source

vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

open access: yesБезопасность информационных технологий, 2014
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian   +2 more
doaj  

An efficient cryptographic protocol verifier based on prolog rules

open access: yesProceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001
B. Blanchet
semanticscholar   +1 more source

Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2

open access: yes网络与信息安全学报
A critical component of cybersecurity protection in the internet of vehicles (IoV) was identity authentication. However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms.
SU Binting, FANG He, XU Li
doaj  

Multi-exponentiation (cryptographic protocols)

open access: green, 1994
Sung‐Ming Yen   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy