Results 61 to 70 of about 2,626,008 (101)
Defensive Distillation is Not Robust to Adversarial Examples [PDF]
We show that defensive distillation is not secure: it is no more resistant to targeted misclassification attacks than unprotected neural networks.
arxiv
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.
arxiv
Post Quantum Cryptography and its Comparison with Classical Cryptography [PDF]
Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions
arxiv
Cryptography: Classical versus Post-Quantum [PDF]
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv
Late 2023 witnessed significant user activity on EVM chains, resulting in a surge in transaction activity and putting many rollups into the first live test. While some rollups performed well, some others experienced downtime during this period, affecting
Gogol, Krzysztof+3 more
core
New Class of Ciphers Using Hardware Entropy Source
We present a novel, computationally simple method of hiding any message in the stream of random bits by using a secret key. The method is called Bury Among Random Numbers (BARN). A stream of random bits is produced by extracting the entropy of a physical
Kuzmicz, Wieslaw B.+1 more
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SYMMETRIC ENCRYPTION: COUNTERING DATA PROTECTION AND DATA SECURITY IN CLOUD CRYPTOGRAPHY
International Journal of Researches in Biosciences and Agriculture Technology, 2023: Cloud computing has become the ideal way to deliver enterprise applications and the preferred solution for companies extending their infrastructure or launching new innovations. Data security is the most important aspects in cloud platform.
Amruta J Thakur and R N Jugele Amruta J Thakur and R N Jugele
semanticscholar +1 more source
DESIGN AND IMPLEMENTATION OF CRYPTCLOUD SYSTEM FOR SECURING FILES IN CLOUD
Advances in Mathematics: Scientific Journal, 2020A BSTRACT . This research paper deals with an efficient method of securing files and folders in cloud using the method of cryptography. Some features such as Advanced Encryption System (AES) algorithm is used to convert plain text to cipher text and cipher
P. Naidu+3 more
semanticscholar +1 more source
IMAGE STEGANOGRAPHY ON COMPRESSED AND ENCRYPTED MESSAGE USING RSA, AES, 3DES, DES and BLOWFISH
Advances in Mathematics: Scientific Journal, 2020A BSTRACT . In today’s world, Vulnerability of confidential information is growing due to insecure communication channel. Cryptography and steganography are common techniques of promoting security. A hybrid of these techniques enhances the security.
M. Damrudi, And Kamal, Jadidy Aval
semanticscholar +1 more source