Results 121 to 130 of about 1,926,564 (269)
ABSTRACT We present the construction and validation of a scale for measuring cryptocurrency knowledge. As users continue to adopt digital currencies and government agencies introduce more regulatory legislation, researchers need to understand the general public's degree of literacy in this area.
Michael Jones +2 more
wiley +1 more source
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh +2 more
doaj +1 more source
Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque +4 more
wiley +1 more source
Enhancing the SRAM PUF with an XOR Gate
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard +2 more
doaj +1 more source
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian +2 more
doaj
An efficient cryptographic protocol verifier based on prolog rules
B. Blanchet
semanticscholar +1 more source
A critical component of cybersecurity protection in the internet of vehicles (IoV) was identity authentication. However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms.
SU Binting, FANG He, XU Li
doaj
Introduction to Protocol Building Blocks In Cryptography [PDF]
Maher Ali Rusho
openalex +1 more source
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography [PDF]
Armand Niederberger +2 more
openalex +1 more source

