Results 1 to 10 of about 65,060 (255)

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +2 more sources

Trivializing Verification of Cryptographic Protocols

open access: yesComputer Assisted Methods in Engineering and Science, 2023
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Vulnerability of blockchain technologies to quantum attacks

open access: yesArray, 2021
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
Joseph J. Kearney   +1 more
doaj   +1 more source

Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic

open access: yesApplied Sciences, 2020
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

open access: yesICTACT Journal on Communication Technology, 2017
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are
Amol H Shinde, A J Umbarkar, N R Pillai
doaj   +1 more source

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +1 more source

Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [PDF]

open access: yesJisuanji kexue
Unknown cryptographic protocols are widely used for the secure transmission of sensitive information,and reversing cryptographic protocol is of great significance to both attackers and defenders.In order to efficiently reverse complex cryptographic ...
LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
doaj   +1 more source

Reconstructing a lightweight security protocol in the radio‐frequency identification systems

open access: yesIET Computers & Digital Techniques, 2023
Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective ...
Alireza Abdellahi Khorasgani   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy