Results 11 to 20 of about 10,693 (203)

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Error Amplification in Code-based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson   +2 more
doaj   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Worst case QC-MDPC decoder for McEliece cryptosystem [PDF]

open access: yes, 2016
McEliece encryption scheme which enjoys relatively small key sizes as well as a security reduction to hard problems of coding theory. Furthermore, it remains secure against a quantum adversary and is very well suited to low cost implementations on ...
Chaulet, Julia, Sendrier, Nicolas
core   +4 more sources

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS [PDF]

open access: yesJournal of Engineering Science and Technology, 2012
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used.
M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
doaj  

Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

open access: yes, 2019
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker   +16 more
core   +1 more source

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

open access: yes, 2018
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand   +4 more
core   +1 more source

3D Textured Model Encryption via 3D Lu Chaotic Mapping

open access: yes, 2017
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov   +9 more
core   +1 more source

Dual on-premises storage framework for memory optimization and secure data transmission in nuclear power plants

open access: yesNuclear Engineering and Technology
In nuclear power plants, efficiently managing sensitive data and ensuring secure transmission between nodes and storage systems are critical for maintaining operational integrity and safety. This paper proposes a novel approach utilizing dual on-premises
Niayesh Gharaei
doaj   +1 more source

Home - About - Disclaimer - Privacy