Articles with "cryptography" as a keyword



Photo from wikipedia

Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography

Sign Up to like & get
recommendations!
Published in 2021 at "Mediterranean Journal of Mathematics"

DOI: 10.1007/s00009-021-01841-2

Abstract: Functional encryption (FE) is an exciting new public key paradigm that provides solutions to most of the security challenges of cloud computing in a non-interactive manner. In the context of FE, inner product functional encryption… read more here.

Keywords: post quantum; public key; mathbf; cryptography ... See more keywords
Photo by hudsoncrafted from unsplash

An ultra robust session key based image cryptography

Sign Up to like & get
recommendations!
Published in 2019 at "Microsystem Technologies"

DOI: 10.1007/s00542-019-04518-9

Abstract: Increased use of internet demands substantial protection for secret image file from any adversary, specifically during transmission. In the field of cryptography there are two role models: cryptographer and crypt-analyst/attacker. The cryptographer develops techniques to… read more here.

Keywords: session key; session; cryptography; image ... See more keywords
Photo from wikipedia

Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Geographical Systems"

DOI: 10.1007/s10109-017-0252-3

Abstract: Abstract As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement… read more here.

Keywords: subjects data; research; human subjects; cancer ... See more keywords
Photo from wikipedia

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0927-z

Abstract: Mobile ad hoc networks (MANETs) are qualified by multi-hop wireless links and resource restrained nodes. Generally, mobile ad hoc networks (MANETs) are susceptible to various attacks like gray hole attack, black hole attack, selective packet… read more here.

Keywords: attack; detection system; detection; trust ... See more keywords
Photo from wikipedia

Editorial: Special issue on recent trends in cryptography

Sign Up to like & get
recommendations!
Published in 2017 at "Cryptography and Communications"

DOI: 10.1007/s12095-017-0269-y

Abstract: As our society becomes ever more dependent on digital technologies, cryptography becomes increasingly important to secure data while it is being stored, transferred and processed. In the field of cryptography there is a strong crossfertilization… read more here.

Keywords: research; trends cryptography; recent trends; cryptography ... See more keywords
Photo from academic.microsoft.com

A Survey on Quantum Cryptography

Sign Up to like & get
recommendations!
Published in 2018 at "Chinese Journal of Electronics"

DOI: 10.1049/cje.2018.01.017

Abstract: Quantum cryptography (QC) as an important technology to protect the security of the future network communication, has gained extensive attention from both academia and industry in recent years. This paper provides a concise up-to-date review… read more here.

Keywords: cryptography; quantum; survey quantum; quantum cryptography ... See more keywords
Photo by goian from unsplash

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2968985

Abstract: Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the… read more here.

Keywords: post quantum; quantum blockchain; cryptography; blockchain ... See more keywords
Photo from wikipedia

Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3115087

Abstract: An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things (NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum computing, another emerging technological paradigm, promises novel compute opportunities… read more here.

Keywords: internet things; cryptography; quantum resistant; location ... See more keywords
Photo from wikipedia

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3129224

Abstract: The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. Public key… read more here.

Keywords: cryptography; past present; rsa; rsa based ... See more keywords
Photo by papaioannou_kostas from unsplash

LORENA: Low memORy symmEtric-key geNerAtion method for based on group cryptography protocol applied to the Internet of Healthcare Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3143210

Abstract: The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT… read more here.

Keywords: key generation; group; symmetric key; cryptography ... See more keywords
Photo by erdaest from unsplash

S-Box Attack Using FPGA Reverse Engineering for Lightweight Cryptography

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3195733

Abstract: Since the use of lightweight cryptography for Internet of Things (IoT) security increases, it is necessary to inform significant threats to IoT devices through research on the attacks of lightweight cryptography. This article demonstrates successful… read more here.

Keywords: bit; cryptography; box attack; lightweight cryptography ... See more keywords