Can NSEC5 be practical for DNSSEC deployments? [PDF]
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon+6 more
core
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed+3 more
core +6 more sources
CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks
The CommTLC scheme is secure against Fakey, Griefing and Wormhole attacks, as proven using the universal composability framework. It detects adversaries in these attacks within 112 ms for a payment path involving five users. Additionally, it outperforms recent privacy‐preserving PCN‐based solutions, MAPPCN‐OR and EAMHL+, in terms of communication and ...
Prerna Arote, Joy Kuri
wiley +1 more source
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core +1 more source
ShaEr: A Blockchain‐Based Framework for Secure Medical Data Sharing and Monetisation
This paper presents a novel framework to enable secure medical data sharing and monetisation that utilises the inherent features of blockchain to establish a robust and transparent framework. It presents a reward policy aimed at incentivising data owners to share their data with third parties by ensuring that the real identity of the data owner remains
Md. Ahsan Habib+1 more
wiley +1 more source
Error analysis and detection procedures for elliptic curve cryptography
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy+2 more
doaj
Lightweight Authentication Scheme for Resource‐Constrained Devices in IIoT
An authentication scheme leveraging elliptic curve cryptography (ECC) and lightweight cryptography was proposed. This scheme is designed to facilitate secure communication among IIoT devices while minimizing resource usage. ABSTRACT The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource ...
Zhong Cao+4 more
wiley +1 more source
CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley +1 more source
Cryptography algorithm for wireless channel of CBTC system
As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y ...
WANG Chao1+4 more
doaj +2 more sources
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications.
Preethi Preethi+5 more
doaj +1 more source