Results 51 to 60 of about 180,085 (154)

PathFuzzer: Sensitive Information Flow Path-Guided Fuzzing for Intent Vulnerabilities in Android Applications

open access: yesIET Information Security
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security.
Zhanhui Yuan   +4 more
doaj   +1 more source

SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL

open access: yesTạp chí Khoa học Đại học Đà Lạt
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan   +3 more
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini   +4 more
doaj   +1 more source

Computational Soundness of Formal Encryption in Coq [PDF]

open access: yes, 2007
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prover. This requires to model notions of provable cryptography like indistinguishability between ensembles of probability distributions, PPT reductions, and ...
Corin, R.J.
core   +2 more sources

Key distribution in PKC through Quantas

open access: yes, 2010
Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light".
Goel, Aditya
core   +1 more source

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

A Comparison of Cryptography Courses

open access: yes, 2004
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core   +1 more source

Home - About - Disclaimer - Privacy