Results 101 to 110 of about 3,739 (238)

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

PDFS: Practical Data Feed Service for Smart Contracts

open access: yes, 2019
Smart contracts are a new paradigm that emerged with the rise of the blockchain technology. They allow untrusting parties to arrange agreements. These agreements are encoded as a programming language code and deployed on a blockchain platform, where all ...
D Bayer   +6 more
core   +1 more source

Throughput Optimum Architecture of KECCAK Hash Function

open access: yesInternational Journal of Computer and Electrical Engineering, 2012
Because of the weakening of the widely-used SHA-1 hash algorithm and concerns over the similarly-structured algorithms of the SHA-2 family; the US NIST has initiated the SHA-3 contest in order to select a suitable drop-in replacement. In this paper we use the unrolling method to describe the high-speed hardware implementation of the SHA-3 hash function
A. Gholipour, S. Mirzakuchaki
openaire   +1 more source

Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
We study quantum superposition attacks against permutation‐based pseudorandom cryptographic schemes. We first extend Kuwakado and Morii’s attack against the Even–Mansour cipher and exhibit key recovery attacks against a large class of pseudorandom schemes based on a single call to an n‐bit permutation, with polynomial O(n) (or O(n2), if the concrete ...
Shaoxuan Zhang   +3 more
wiley   +1 more source

Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications

open access: yesJournal of Engineering, Volume 2024, Issue 1, 2024.
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used for secure communications in Internet of Things (IoT) applications. In this study, the implementation and analyze the Elliptic Curve Digital Signature Algorithm (ECDSA) with NIST‐256 on MicroBlaze processors based on RISC‐V architecture. This implementation aims to
Preethi Preethi   +6 more
wiley   +1 more source

A Compact Hardware Design and Implementation on FPGA Based Hybrid of AES and Keccak SHA3-512 for Enhancing Data Security

open access: yesInternational journal of electrical and electronics research
Data security means protecting important information from unauthorised persons. In a security system, cryptography is the most secure method. Cryptography has many kinds, but the Advanced Encryption Standard (AES) is the most secure system.
K. J. Lakshmi, G. Sreenivasulu
semanticscholar   +1 more source

Assessing Data Usefulness for Failure Analysis in Anonymized System Logs

open access: yes, 2018
System logs are a valuable source of information for the analysis and understanding of systems behavior for the purpose of improving their performance. Such logs contain various types of information, including sensitive information.
Ciorba, Florina M., Ghiasvand, Siavash
core   +1 more source

Key-Recovery Attacks on Full Kravatte

open access: yesIACR Transactions on Symmetric Cryptology, 2018
This paper presents a cryptanalysis of full Kravatte, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length.
Colin Chaigneau   +6 more
doaj   +1 more source

Internet of Things: Survey on Security and Privacy

open access: yes, 2017
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M.   +2 more
core   +1 more source

3-Share Threshold Implementation of AES S-box without Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Threshold implementation is studied as a countermeasure against sidechannel attack. There had been no threshold implementation for the AES and Keccak S-boxes that satisfies an important property called uniformity.
Takeshi Sugawara
doaj   +1 more source

Home - About - Disclaimer - Privacy