Search Results - "Cryptography"
-
1
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
Published in Cryptography (01-03-2019)“…Blockchain technology has gained considerable attention, with an escalating interest in a plethora of numerous applications, ranging from data management,…”
Get full text
Journal Article -
2
Multi-Factor Authentication: A Survey
Published in Cryptography (01-03-2018)“…Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It…”
Get full text
Journal Article -
3
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication
Published in Cryptography (01-03-2020)“…Quantum key distribution (QKD) offers future proof security based on fundamental laws of physics. Long-distance QKD spanning regions such as the United Kingdom…”
Get full text
Journal Article -
4
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
Published in Cryptography (01-06-2020)“…Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical…”
Get full text
Journal Article -
5
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Published in Cryptography (01-03-2022)“…This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm…”
Get full text
Journal Article -
6
A Survey of Post-Quantum Cryptography: Start of a New Race
Published in Cryptography (01-09-2023)“…Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to…”
Get full text
Journal Article -
7
Provably Secure Covert Communication on Blockchain
Published in Cryptography (01-09-2018)“…Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing…”
Get full text
Journal Article -
8
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
Published in Cryptography (01-04-2022)“…In the 5G intelligent edge scenario, more and more accelerator-based single-board computers (SBCs) with low power consumption and high performance are being…”
Get full text
Journal Article -
9
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
Published in Cryptography (01-07-2022)“…Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of…”
Get full text
Journal Article -
10
A Novel Ultra-Compact FPGA PUF: The DD-PUF
Published in Cryptography (01-09-2021)“…In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF…”
Get full text
Journal Article -
11
Quantum Secret Aggregation Utilizing a Network of Agents
Published in Cryptography (01-03-2023)“…Suppose that the renowned spymaster Alice controls a network of spies who all happen to be deployed in different geographical locations. Let us further assume…”
Get full text
Journal Article -
12
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
Published in Cryptography (01-03-2021)“…In this paper, we present the need for specialized artificial intelligence (AI) for counterfeit and defect detection of PCB components. Popular computer vision…”
Get full text
Journal Article -
13
A Simple Protocol for Certifying Graph States and Applications in Quantum Networks
Published in Cryptography (22-01-2020)“…We present a simple protocol for certifying graph states in quantum networks using stabiliser measurements. The certification statements can easily be applied…”
Get full text
Journal Article -
14
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability
Published in Cryptography (01-06-2023)“…In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the…”
Get full text
Journal Article -
15
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
Published in Cryptography (01-06-2022)“…Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced…”
Get full text
Journal Article -
16
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
Published in Cryptography (01-06-2024)“…Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber…”
Get full text
Journal Article -
17
Light Weight Authentication Scheme for Smart Home IoT Devices
Published in Cryptography (01-09-2022)“…In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these…”
Get full text
Journal Article -
18
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
Published in Cryptography (01-12-2021)“…According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes…”
Get full text
Journal Article -
19
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
Published in Cryptography (01-11-2023)“…Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs)…”
Get full text
Journal Article -
20
Implantable Medical Device Security
Published in Cryptography (15-11-2024)“…Implantable medical devices, or IMDs for short, are medical instruments that are placed into the human body through surgery. IMDs are typically used for…”
Get full text
Journal Article