Results 41 to 50 of about 349,531 (370)

Design and implementation of an energy-efficient Keccak algorithm ASIC

open access: yesDianzi Jishu Yingyong, 2019
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj   +1 more source

Realization Scheme for Visual Cryptography with Computer-generated Holograms [PDF]

open access: yesarXiv, 2022
We propose to realize visual cryptography in an indirect way with the help of computer-generated hologram. At present, the recovery method of visual cryptography is mainly superimposed on transparent film or superimposed by computer equipment, which greatly limits the application range of visual cryptography.
arxiv  

Applied Cryptography

open access: yes, 2020
Cryptography is an indispensable tool for protecting information in computer systems. During this course I learnt how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
Raju Singh
semanticscholar   +1 more source

Quantum-Resistant Cryptography [PDF]

open access: yesarXiv, 2021
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv  

ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the
Guillaume Barbu   +8 more
doaj   +3 more sources

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment

open access: yesMathematics, 2023
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing ...
Qingyun Xie, Zixuan Ding, Qi Xie
doaj   +1 more source

The Impact of Quantum Computing on Present Cryptography [PDF]

open access: yesarXiv.org, 2018
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Vasileios Mavroeidis   +3 more
semanticscholar   +1 more source

Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy