Results 21 to 30 of about 11,259,019 (289)

Integral Cryptanalysis of Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim   +5 more
doaj   +1 more source

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

Improved Ciphertext-Only Attack on GMR-1

open access: yesIEEE Access, 2022
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider.
Dongjae Lee   +4 more
doaj   +1 more source

Camouflage Backdoor Attack against Pedestrian Detection

open access: yesApplied Sciences, 2023
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu   +9 more
doaj   +1 more source

Information Privacy, Cultural Values, and Regulatory Preferences

open access: yesJournal of Global Information Management, 2021
The global nature of e-commerce is complicating privacy issues because perceptions of privacy, trust, risk, and fair information practices vary across cultures, and differences in national regulation create challenges for global information management ...
John Benamati   +2 more
semanticscholar   +1 more source

Optimized CSIDH Implementation Using a 2-Torsion Point

open access: yesCryptography, 2020
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo   +4 more
doaj   +1 more source

"The dearest of our possessions": applying Floridi's information privacy concept in models of information behavior and information literacy [PDF]

open access: yes, 2020
This conceptual paper argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics.
Bawden D.   +25 more
core   +1 more source

Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor

open access: yesApplied Sciences, 2020
In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics.
Dong-won Park   +3 more
doaj   +1 more source

A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit

open access: yesElectronic Research Archive, 2023
With the continuous development of Internet of Things, finance, big data and many other fields, blockchain has been widely used in these areas for transactions, data sharing, product traceability and so on. Numerous assets have appeared in the blockchain,
Shuang Yao , Dawei Zhang
doaj   +1 more source

Rentable CDN Using Blockchain and Proof of Provenance

open access: yesApplied Sciences, 2020
Building a rentable content delivery network (CDN), a p2p based CDN that supports content control and is composed of hardware rented from consumers, requires significant trust between the renters and consumers.
Suah Kim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy