Results 61 to 70 of about 5,946 (156)

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Cryptanalysis of Keyword Confidentiality in a Searchable Public‐Key Encryption Scheme Against Malicious Server

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Public‐key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword‐guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated‐server PAEKS (dPAEKS) scheme was proposed to withstand KGAs.
Nan Zhang   +3 more
wiley   +1 more source

Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange

open access: yesIET Information Security, 2023
Password‐authenticated key exchange (PAKE) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys.
Peixin Ren, Xiaozhuo Gu, Ziliang Wang
doaj   +1 more source

Design of Quantum Circuits for Galois Field Squaring and Exponentiation

open access: yes, 2017
This work presents an algorithm to generate depth, quantum gate and qubit optimized circuits for $GF(2^m)$ squaring in the polynomial basis. Further, to the best of our knowledge the proposed quantum squaring circuit algorithm is the only work that ...
Muñoz-Coreas, Edgard   +1 more
core   +1 more source

Constructing Efficient Identity‐Based Signatures on Lattices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia   +4 more
wiley   +1 more source

Variations of the McEliece Cryptosystem

open access: yes, 2017
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process.
Alain Couvreur   +16 more
core   +1 more source

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]

open access: yesQuantum
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are $good$ in that they exhibit constant rate and average distance scaling $\Delta \propto \sqrt{
Jonathan Conrad   +2 more
doaj   +1 more source

Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]

open access: yes, 2018
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core   +1 more source

Quantum Secure Image Transmission: A Chaos‐Assisted Quantum Key Distribution Approach Using Entanglement

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
A novel secure image transmission scheme has been proposed using the logistic chaos map and the Ekert protocol. The quantum key distribution can be used to generate seed parameters for classical chaos, thus ensuring a strong encryption method. ABSTRACT The emergence of quantum computing has introduced unprecedented security challenges to conventional ...
Raiyan Rahman   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy