Search Results - "Cryptography"

Refine Results
  1. 1

    Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives by Siyal, Asad Ali, Junejo, Aisha Zahid, Zawish, Muhammad, Ahmed, Kainat, Khalil, Aiman, Soursou, Georgia

    Published in Cryptography (01-03-2019)
    “…Blockchain technology has gained considerable attention, with an escalating interest in a plethora of numerous applications, ranging from data management,…”
    Get full text
    Journal Article
  2. 2

    Multi-Factor Authentication: A Survey by Ometov, Aleksandr, Bezzateev, Sergey, Mäkitalo, Niko, Andreev, Sergey, Mikkonen, Tommi, Koucheryavy, Yevgeni

    Published in Cryptography (01-03-2018)
    “…Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It…”
    Get full text
    Journal Article
  3. 3

    QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication by Mazzarella, Luca, Lowe, Christopher, Lowndes, David, Joshi, Siddarth Koduru, Greenland, Steve, McNeil, Doug, Mercury, Cassandra, Macdonald, Malcolm, Rarity, John, Oi, Daniel Kuan Li

    Published in Cryptography (01-03-2020)
    “…Quantum key distribution (QKD) offers future proof security based on fundamental laws of physics. Long-distance QKD spanning regions such as the United Kingdom…”
    Get full text
    Journal Article
  4. 4

    Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman by Randolph, Mark, Diehl, William

    Published in Cryptography (01-06-2020)
    “…Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical…”
    Get full text
    Journal Article
  5. 5

    Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup by Gueron, Shay, Persichetti, Edoardo, Santini, Paolo

    Published in Cryptography (01-03-2022)
    “…This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm…”
    Get full text
    Journal Article
  6. 6

    A Survey of Post-Quantum Cryptography: Start of a New Race by Dam, Duc-Thuan, Tran, Thai-Ha, Hoang, Van-Phuc, Pham, Cong-Kha, Hoang, Trong-Thuc

    Published in Cryptography (01-09-2023)
    “…Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to…”
    Get full text
    Journal Article
  7. 7

    Provably Secure Covert Communication on Blockchain by Partala, Juha

    Published in Cryptography (01-09-2018)
    “…Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing…”
    Get full text
    Journal Article
  8. 8

    Benchmark Analysis of YOLO Performance on Edge Intelligence Devices by Feng, Haogang, Mu, Gaoze, Zhong, Shida, Zhang, Peichang, Yuan, Tao

    Published in Cryptography (01-04-2022)
    “…In the 5G intelligent edge scenario, more and more accelerator-based single-board computers (SBCs) with low power consumption and high performance are being…”
    Get full text
    Journal Article
  9. 9

    BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models by Wibawa, Febrianti, Catak, Ferhat Ozgur, Sarp, Salih, Kuzlu, Murat

    Published in Cryptography (01-07-2022)
    “…Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of…”
    Get full text
    Journal Article
  10. 10

    A Novel Ultra-Compact FPGA PUF: The DD-PUF by Della Sala, Riccardo, Bellizia, Davide, Scotti, Giuseppe

    Published in Cryptography (01-09-2021)
    “…In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF…”
    Get full text
    Journal Article
  11. 11

    Quantum Secret Aggregation Utilizing a Network of Agents by Ampatzis, Michael, Andronikos, Theodore

    Published in Cryptography (01-03-2023)
    “…Suppose that the renowned spymaster Alice controls a network of spies who all happen to be deployed in different geographical locations. Let us further assume…”
    Get full text
    Journal Article
  12. 12

    Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It? by Mallaiyan Sathiaseelan, Mukhil Azhagan, Paradis, Olivia P., Taheri, Shayan, Asadizanjani, Navid

    Published in Cryptography (01-03-2021)
    “…In this paper, we present the need for specialized artificial intelligence (AI) for counterfeit and defect detection of PCB components. Popular computer vision…”
    Get full text
    Journal Article
  13. 13

    A Simple Protocol for Certifying Graph States and Applications in Quantum Networks by Markham, Damian, Krause, Alexandra

    Published in Cryptography (22-01-2020)
    “…We present a simple protocol for certifying graph states in quantum networks using stabiliser measurements. The certification statements can easily be applied…”
    Get full text
    Journal Article
  14. 14

    A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability by Della Sala, Riccardo, Scotti, Giuseppe

    Published in Cryptography (01-06-2023)
    “…In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the…”
    Get full text
    Journal Article
  15. 15

    ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3 by Serrano, Ronaldo, Duran, Ckristian, Sarmiento, Marco, Pham, Cong-Kha, Hoang, Trong-Thuc

    Published in Cryptography (01-06-2022)
    “…Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced…”
    Get full text
    Journal Article
  16. 16

    Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography by Fitzgibbon, Gregory, Ottaviani, Carlo

    Published in Cryptography (01-06-2024)
    “…Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber…”
    Get full text
    Journal Article
  17. 17

    Light Weight Authentication Scheme for Smart Home IoT Devices by Kumar, Vipin, Malik, Navneet, Singla, Jimmy, Jhanjhi, N. Z., Amsaad, Fathi, Razaque, Abdul

    Published in Cryptography (01-09-2022)
    “…In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these…”
    Get full text
    Journal Article
  18. 18

    Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach by Sayadi, Hossein, Gao, Yifeng, Mohammadi Makrani, Hosein, Lin, Jessica, Costa, Paulo Cesar, Rafatirad, Setareh, Homayoun, Houman

    Published in Cryptography (01-12-2021)
    “…According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes…”
    Get full text
    Journal Article
  19. 19

    FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis by Lata, Kusum, Cenkeramaddi, Linga Reddy

    Published in Cryptography (01-11-2023)
    “…Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs)…”
    Get full text
    Journal Article
  20. 20

    Implantable Medical Device Security by Catuogno, Luigi, Galdi, Clemente

    Published in Cryptography (15-11-2024)
    “…Implantable medical devices, or IMDs for short, are medical instruments that are placed into the human body through surgery. IMDs are typically used for…”
    Get full text
    Journal Article