Results 11 to 20 of about 10,693 (203)
Tree Parity Machine Rekeying Architectures [PDF]
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core +5 more sources
Error Amplification in Code-based Cryptography
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson +2 more
doaj +1 more source
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice +2 more
core +2 more sources
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source
Worst case QC-MDPC decoder for McEliece cryptosystem [PDF]
McEliece encryption scheme which enjoys relatively small key sizes as well as a security reduction to hard problems of coding theory. Furthermore, it remains secure against a quantum adversary and is very well suited to low cost implementations on ...
Chaulet, Julia, Sendrier, Nicolas
core +4 more sources
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS [PDF]
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used.
M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
doaj
Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker +16 more
core +1 more source
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand +4 more
core +1 more source
3D Textured Model Encryption via 3D Lu Chaotic Mapping
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov +9 more
core +1 more source
In nuclear power plants, efficiently managing sensitive data and ensuring secure transmission between nodes and storage systems are critical for maintaining operational integrity and safety. This paper proposes a novel approach utilizing dual on-premises
Niayesh Gharaei
doaj +1 more source

