Results 1 to 10 of about 1,432,988 (298)
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park +5 more
doaj +1 more source
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim +3 more
doaj +1 more source
Integral Cryptanalysis of Lightweight Block Cipher PIPO
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim +5 more
doaj +1 more source
On the Performance Analysis for CSIDH-Based Cryptosystems
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo +3 more
doaj +1 more source
Improved Ciphertext-Only Attack on GMR-1
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider.
Dongjae Lee +4 more
doaj +1 more source
"The dearest of our possessions": applying Floridi's information privacy concept in models of information behavior and information literacy [PDF]
This conceptual paper argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics.
Bawden D. +25 more
core +1 more source
Optimized CSIDH Implementation Using a 2-Torsion Point
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo +4 more
doaj +1 more source
Camouflage Backdoor Attack against Pedestrian Detection
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu +9 more
doaj +1 more source
Information privacy concern at individual, group, organization and societal level - a literature review [PDF]
Purpose – In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy concern arising because of the application of computer-based ...
Dillip Kumar Rath, Ajit Kumar
doaj +1 more source
Rentable CDN Using Blockchain and Proof of Provenance
Building a rentable content delivery network (CDN), a p2p based CDN that supports content control and is composed of hardware rented from consumers, requires significant trust between the renters and consumers.
Suah Kim +2 more
doaj +1 more source

