Articles with "encryption key" as a keyword



Photo from wikipedia

On the Development of a Protection Profile Module for Encryption Key Management Components

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3239043

Abstract: The ability of a cryptographic system to protect information from attacks depends on many factors, including the secrecy of the encryption key. A crucial aspect of any cryptosystem is how it manages the encryption keys.… read more here.

Keywords: encryption key; security; protection profile; key management ... See more keywords
Photo by dawson2406 from unsplash

Analysis of Encryption Key Generation in Modern Crypto Ransomware

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3005976

Abstract: The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of the victims for monetary gain.… read more here.

Keywords: encryption; encryption key; analysis; crypto ransomware ... See more keywords