Results 61 to 70 of about 2,626,008 (101)

Defensive Distillation is Not Robust to Adversarial Examples [PDF]

open access: yesarXiv, 2016
We show that defensive distillation is not secure: it is no more resistant to targeted misclassification attacks than unprotected neural networks.
arxiv  

Emergent Behavior in Cybersecurity [PDF]

open access: yesarXiv, 2015
We argue that emergent behavior is inherent to cybersecurity.
arxiv  

Post Quantum Cryptography and its Comparison with Classical Cryptography [PDF]

open access: yesarXiv
Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions
arxiv  

Cryptography: Classical versus Post-Quantum [PDF]

open access: yesarXiv
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv  

The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on Rollup Performance and Cost Efficiency

open access: yes
Late 2023 witnessed significant user activity on EVM chains, resulting in a surge in transaction activity and putting many rollups into the first live test. While some rollups performed well, some others experienced downtime during this period, affecting
Gogol, Krzysztof   +3 more
core  

New Class of Ciphers Using Hardware Entropy Source

open access: yes
We present a novel, computationally simple method of hiding any message in the stream of random bits by using a secret key. The method is called Bury Among Random Numbers (BARN). A stream of random bits is produced by extracting the entropy of a physical
Kuzmicz, Wieslaw B.   +1 more
core  

Call for papers

open access: yesNationalities Papers, 1998
P. Grangier, A. Karlsson, J. Rarity
semanticscholar   +1 more source
Some of the next articles are maybe not open access.

Related searches:

SYMMETRIC ENCRYPTION: COUNTERING DATA PROTECTION AND DATA SECURITY IN CLOUD CRYPTOGRAPHY

International Journal of Researches in Biosciences and Agriculture Technology, 2023
: Cloud computing has become the ideal way to deliver enterprise applications and the preferred solution for companies extending their infrastructure or launching new innovations. Data security is the most important aspects in cloud platform.
Amruta J Thakur and R N Jugele Amruta J Thakur and R N Jugele
semanticscholar   +1 more source

DESIGN AND IMPLEMENTATION OF CRYPTCLOUD SYSTEM FOR SECURING FILES IN CLOUD

Advances in Mathematics: Scientific Journal, 2020
A BSTRACT . This research paper deals with an efficient method of securing files and folders in cloud using the method of cryptography. Some features such as Advanced Encryption System (AES) algorithm is used to convert plain text to cipher text and cipher
P. Naidu   +3 more
semanticscholar   +1 more source

IMAGE STEGANOGRAPHY ON COMPRESSED AND ENCRYPTED MESSAGE USING RSA, AES, 3DES, DES and BLOWFISH

Advances in Mathematics: Scientific Journal, 2020
A BSTRACT . In today’s world, Vulnerability of confidential information is growing due to insecure communication channel. Cryptography and steganography are common techniques of promoting security. A hybrid of these techniques enhances the security.
M. Damrudi, And Kamal, Jadidy Aval
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy