Results 11 to 20 of about 10,730 (205)

Error Amplification in Code-based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson   +2 more
doaj   +1 more source

From Quantum Cheating to Quantum Security [PDF]

open access: yes, 2000
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures.
Gottesman, Daniel, Lo, Hoi-Kwong
core   +4 more sources

Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]

open access: yes, 2020
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi   +8 more
core   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS [PDF]

open access: yesJournal of Engineering Science and Technology, 2012
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used.
M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
doaj  

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

open access: yes, 2018
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand   +4 more
core   +1 more source

Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

open access: yes, 2019
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker   +16 more
core   +1 more source

Optimal QoS Constraint Service Composition in Mobile Ad Hoc Networks

open access: yes, 2017
In recent year's computational capability of the mobile nodes have been greatly improved. The mobile nodes have the capability of running different applications.
Belgaum, Mohammad Riyaz   +2 more
core   +1 more source

Dual on-premises storage framework for memory optimization and secure data transmission in nuclear power plants

open access: yesNuclear Engineering and Technology
In nuclear power plants, efficiently managing sensitive data and ensuring secure transmission between nodes and storage systems are critical for maintaining operational integrity and safety. This paper proposes a novel approach utilizing dual on-premises
Niayesh Gharaei
doaj   +1 more source

Home - About - Disclaimer - Privacy