Printer Friendly

Browse Cryptography topic

Articles

1-300 out of 562 article(s) nextnext page
Title Author Type Date Words
Physics experiment has demonstrated quantum cryptography. Sep 19, 2020 158
A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT. Abed, Ahmed Mohsin; Boyaci, Ali Report Jul 14, 2020 3746
An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission. Kumar, N. Rajesh; Krishnan, R. Bala; Manikandan, G.; Raajan, N.R. Jul 1, 2020 4782
PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation. Kim, Aeyoung; Wang, Changda; Seo, Seung-Hyun Jul 1, 2020 9415
Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study. Li, Weijian; Huang, Xian; Zhao, Huimin; Xie, Guoliang; Lu, Fuxiang Case study Jun 30, 2020 6492
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. Cano, Maria-Dolores; Canavate-Sanchez, Antonio Jun 30, 2020 7610
Cryptographic Strength Evaluation of Key Schedule Algorithms. Afzal, Shazia; Yousaf, Muhammad; Afzal, Humaira; Alharbe, Nawaf; Mufti, Muhammad Rafiq May 31, 2020 7679
LWE: An Energy-Efficient Lightweight Encryption Algorithm for Medical Sensors and IoT Devices. Toprak, Sezer; Akbulut, Akhan; Aydin, Muhammed Ali; Zaim, Abdul Haim Report May 2, 2020 5121
A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption. Truong, Nguyen Huy Report May 1, 2020 10021
EAP-SRES: An Enhanced Authentication Protocol for Secure Remote Education Systems Using NFC Technology. Chikouche, Noureddine; Cherif, Foudil May 1, 2020 6339
DICT orders updating of govt websites' cryptographic protocols. Apr 20, 2020 353
NTT Research Scientist, UCLA Professor Win IACR Test-of-Time Award. Apr 16, 2020 349
NTT Research Scientist, UCLA Professor Win IACR Test-of-Time Award. Apr 16, 2020 336
NTT Research Scientist, UCLA Professor Win IACR Test-of-Time Award. Apr 16, 2020 349
Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption. Zhang, Ping; Yuan, Qian Mar 31, 2020 4239
A Kind of Quaternary Sequences of Period 2[p.sup.m][q.sup.n] and Their Linear Complexity. Wang, Qiuyan; Wu, Chenhuang; Yang, Minghui; Yan, Yang Mar 31, 2020 4687
CCII and FPGA Realization: A Multistable Modified Fourth-Order Autonomous Chua's Chaotic System with Coexisting Multiple Attractors. Yu, Fei; Shen, Hui; Liu, Li; Zhang, Zinan; Huang, Yuanyuan; He, Binyong; Cai, Shuo; Song, Yun; Yin, Mar 31, 2020 9065
Trustology launches credentials wallet for crypto funds. Mar 9, 2020 180
Trustology launches credentials wallet for crypto funds. Mar 9, 2020 178
NTT Research, UCLA, Georgetown Collaborating on Cryptography and Blockchain. Mar 2, 2020 417
NTT Research, UCLA, Georgetown Collaborating on Cryptography and Blockchain. Mar 2, 2020 404
NTT Research, UCLA, Georgetown Collaborating on Cryptography and Blockchain. Mar 2, 2020 417
Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption. Youn, Taek-Young; Jho, Nam-Su Mar 1, 2020 6194
Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing. Dogan, Demet Cidem; Altindis, Huseyin Feb 1, 2020 4581
The Novel Efficient Dual-field FIPS Modular Multiplication. Zhang, Tingting; Zhu, Junru; Liu, Yang; Chen, Fulong Feb 1, 2020 6710
NEXSAN ADDS ROCE AND PRIVATE BLOCKCHAIN TECHNOLOGY. Feb 1, 2020 552
ECAC - A Regulatory Body under MoIT for E-Transactions in Pakistan and to Ensure Security of Digital Economy. Jan 31, 2020 1708
Elliptic Curve Signcryption Based Security Protocol for RFID. Singh, Anuj Kumar; Patro, B.D.K. Jan 1, 2020 10616
UN-Substituted Video Steganography. Abu Maria, Khulood; Alia, Mohammad A.; Alsarayreh, Maher A.; Abu Maria, Eman Jan 1, 2020 8040
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Xie, Congge; Weng, Jian; Wen, Jinming Jan 1, 2020 10081
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. Liu, Jingang; Wang, Yongge; Yi, Zongxiang; Lin, Zhiqiang Jan 1, 2020 8128
Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey. Sheikh, Muhammad Sameer; Liang, Jun; Wang, Wensong Jan 1, 2020 19083
Cryptanalysis of the Lightweight Block Cipher BORON. Liang, Huicong; Wang, Meiqin Dec 31, 2019 6488
Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization, and Secure Communication Application. Yu, Fei; Liu, Li; He, Binyong; Huang, Yuanyuan; Shi, Changqiong; Cai, Shuo; Song, Yun; Du, Sichun; W Dec 31, 2019 9598
The future of fintech. Das, Sanjiv R. Dec 22, 2019 12836
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Zhao, Yi; Liang, Kaitai; Yang, Bo; Chen, Liqun Nov 30, 2019 6547
Global Quantum Cryptography Market Growing Popularity and Emerging Trends in the Industry / ID Quantique, Microsoft, NuCrypt, Qasky. Nov 18, 2019 904
Precise and Infinity Optics Solutions collaborate to develop fingerprint recognition identification software. Nov 13, 2019 203
Precise and Infinity Optics Solutions collaborate to develop fingerprint recognition identification software. Nov 13, 2019 205
Multidivisible Online/Offline Cryptography and Its Application to Signcryptions. Yamamoto, Dan; Ogata, Wakaha Oct 31, 2019 18226
Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields. Wang, Yang; Wang, Mingqiang; Zou, Jingdan; Xu, Jin; Wang, Jing Oct 31, 2019 12445
The Quantum Resistant Ledger (QRL) Foundation Announces a Research Arm to Continue Its Advancement of Post-Quantum Cryptographic Standards. Oct 25, 2019 530
Taking stock of the future... Oct 23, 2019 793
Global Quantum Cryptography Market Analysis and Forecasts by Offering, Application, End-user & Region (2019-2027). Oct 17, 2019 692
Quantum Cryptography Market 2019 Emerging Technologies, Global Trends, Business Growth, Segments, Share, Industry Size, New Applications, Strategies and Regional Forecast 2023. Oct 17, 2019 1194
Quantum Cryptography Market 2019 Global Share, Size, Trends, Segments, Business Growth, Emerging Technologies, Sales Revenue and Regional Forecast 2023. Financial report Oct 2, 2019 865
A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification. Nejad, Maryam Safarian; Malakooti, Mohammad V.; Taba, Navid Hashemi Oct 1, 2019 4637
The Search for Quantum-Resistant Cryptography: Understanding the Future Landscape. Sep 30, 2019 782
Akamai Technologies Acquires KryptoCo Authentication Technology. Sep 25, 2019 216
Akamai Technologies Acquires KryptoCo Authentication Technology. Sep 25, 2019 223
The Enigma Code Breakers Who Saved the World. White, Tim Sep 22, 2019 1823
Hitachi: Chaskey Message Authentication Technology Developed for IoT Systems Supporting Key Infrastructure Adopted by ISO/IEC for Lightweight Cryptography. Sep 20, 2019 749
nCipher announces cloud-based hardware security module service. Sep 18, 2019 641
Global Market for Quantum Cryptography, 2018-2019 & 2019-2024 by Deployment Protocol, Algorithm Type, Component, Application, End-User Vertical. Aug 16, 2019 1206
whiteCryption Secure Key Box adds TLS support for end-to-end data security across networks. Aug 9, 2019 303
whiteCryption Secure Key Box adds TLS support for end-to-end data security across networks. Aug 9, 2019 286
whiteCryption Secure Key Box adds TLS support for end-to-end data security across networks. Aug 9, 2019 303
Quantum Cryptography Market 2019 Global Size, Share, Trends, Growth, Business Strategies, Application, Dynamics, Development Status and Potential of The Industry Till 2023. Aug 8, 2019 978
Red Hat Certificate System Achieves Common Criteria Certification. Aug 5, 2019 445
BRUTE-FORCE SOLVING. Jelen, Bill Aug 1, 2019 972
Secure and Efficient Hybrid Random Number Generator Based on Sponge Constructions for Cryptographic Applications. Yakut, Selman; Tuncer, Taner; Ozer, Ahmet Bedri Aug 1, 2019 5750
An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment. Pradeep, K.V.; Vijayakumar, V.; Subramaniyaswamy, V. Jul 31, 2019 5477
Quantum Xchange, ID Quantique mark one year of partnership. Jul 29, 2019 275
Quantum Xchange, ID Quantique mark one year of partnership. Jul 29, 2019 262
Quantum Xchange, ID Quantique mark one year of partnership. Jul 29, 2019 275
How Quantum Cryptography Works. Jul 1, 2019 166
Towards Secure IoT: Securing Messages Dissemination in Intelligent Traffic Systems. Alshaer, Jawdat Jul 1, 2019 5273
DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique. Majumdar, Abhishek; Biswas, Arpita; Baishnab, Krishna Lal; Sood, Sandeep K. Report Jul 1, 2019 11213
A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification. Nejad, Maryam Safarian; Malakooti, Mohammad V.; Taba, Navid Hashemi Jul 1, 2019 4617
Low-Cost and Secure Communication System for SCADA System of Remote Microgrids. Iqbal, Amjad; Iqbal, M. Tariq Jun 30, 2019 5482
Will This Security Innovation Make Biometrics Obsolete? Public/private key cryptography relies on an exchange of unique data. Yudkowsky, Moshe Jun 22, 2019 767
Transitive Signature Schemes for Undirected Graphs from Lattices. Noh, Geontae; Jeong, Ik Rae Jun 1, 2019 7648
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. Zhu, Rui; Xu, Li; Zeng, Yali; Yi, Xun May 31, 2019 9260
Time to rethink encryption. May 25, 2019 581
A Multi-Stage Encryption Technique to Enhance the Secrecy of Image. Mondal, Arindom; Alam, Kazi Md. Rokibul; Ali, G.G. Md. Nawaz; Chong, Peter Han Joo; Morimoto, Yasuhi May 1, 2019 7008
Programmer solves 20-year-old cryptographic puzzle. Apr 30, 2019 171
Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular Automata. Cardell, Sara D.; Fuster-Sabater, Amparo Apr 30, 2019 7525
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Choi, Joseph I.; Butler, Kevin R.B. Apr 30, 2019 24562
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. Trinh, Viet Cuong Apr 30, 2019 10915
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key. Dorokhin, Edgar Salguero; Fuertes, Walter; Lascano, Edison Apr 30, 2019 6344
NETRONOME LAUNCHES 50GBE OCP-BASED SMARTNICS. Apr 1, 2019 499
Cyber Security Platform Solution Based on the Facial Imaging and Fingerprinting. Alshebli, Sulaiman; Kurugollu, Fatih; Shafik, Mahmoud Apr 1, 2019 6503
Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos. Wang, Shu-ying; Zhao, Jian-feng; Wang, Xiao-yan; Zhang, Li-tao Mar 31, 2019 2713
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. Lu, Yang; Li, Jiguo Report Mar 1, 2019 10509
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. Braeken, A. Report Mar 1, 2019 9107
Methodology for Image Cryptosystem Based on a Gray Code Number System. Nathaniel, Babatunde Akinbowale Mar 1, 2019 4394
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. Qiu, Shuming; Xu, Guosheng; Ahmad, Haseeb; Xu, Guoai; Qiu, Xinping; Xu, Hong Report Feb 1, 2019 11720
Lattice-based Threshold Ring Signature with Message Block Sharing. Chen, Jiangshan; Hu, Yupu; Gao, Wen; Liang, Hongmei Report Feb 1, 2019 8129
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. Zha, Jiningo; Xu, Chunxiang; Chen, Kefei Report Feb 1, 2019 11288
Kudelski Security Launches New Blockchain Security Center. Jan 31, 2019 623
An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers. Han, Guoyong; Zhang, Wenying; Zhao, Hongluan Report Jan 1, 2019 5823
Quantum Cryptography: a new age in data security: Dr Andrew Shields highlights the importance of quantum cryptography in ensuring the future of data security. Shields, Andrew Dec 1, 2018 675
PRaCto: Pseudo Random bit generator for Cryptographic application. Raza, Saiyma Fatima; Satpute, Vishal R. Report Dec 1, 2018 5543
Private Blockchain-Based Secure Access Control for Smart Home Systems. Xue, Jingting; Xu, Chunxiang; Zhang, Yuan Report Dec 1, 2018 9431
Energy Efficient Secured Cluster based Distributed Fault Diagnosis Protocol for IoT. Ara, Tabassum; Prabhkar, M.; Shah, Pritam Gajkumar Report Dec 1, 2018 5498
NordVPN is Taking First Steps Towards Adopting the WireGuard Protocol. Nov 8, 2018 503
Quantum Xchange urges development of quantum-safe defensive solutions for data security. Oct 17, 2018 326
Quantum Xchange urges development of quantum-safe defensive solutions for data security. Oct 17, 2018 311
Quantum Xchange urges development of quantum-safe defensive solutions for data security. Oct 17, 2018 326
Privacy protection of Users' Data in Social Network Systems based on Homomorphic Cryptography Techniques. Kapis, Kosmas; Mshangi, Maduhu Oct 1, 2018 7970
EXTENDED TINY ENCRYPTION ALGORITHM EQUIPPED WITH ARABIC SCRIPT (AXTEA). Sep 30, 2018 2501
Global Demand for Cryptocurrency Market to Incur Considerable Upsurge During 2017-2025. Sep 26, 2018 185
DNS cryptographic key replacement expected soon in Azerbaijan. Sep 10, 2018 410
Building a Fabric of Trust for a 5G Future: Securing 5G networks and devices is no simple task, but a necessary one, and new technology will facilitate the process. Moore, Todd Sep 1, 2018 1239
Improved Conditional Differential Attacks on Round-Reduced Grain v1. Li, Jun-Zhi; Guan, Jie Technical report Sep 1, 2018 5739
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. Zhao, Jining; Xu, Chunxiang; Chen, Kefei Technical report Sep 1, 2018 11089
Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage. Widatama, Krisna; Prayudi, Yudi; Sugiantoro, Bambang Report Sep 1, 2018 3271
Modified Advanced Encryption Standard Algorithm for Reliable Real-Time Communications. Eltatar, Mahmoud A.; Abu-Hudrouss, Ammar M. Sep 1, 2018 3918
Motel of Secrets. Gabrick, Robert Aug 1, 2018 1132
'The Quantum Revolution: Security Implications and Considerations'. Aug 1, 2018 319
Everything You Need to Know About Blockchain. Jul 12, 2018 791
Proposed Simulator Based on Developed Lightweight Authentication and Key Management Protocol for Wireless Sensor Network. Naser, Shaymaa Mahmood; Croock, Muayad Sadik Report Jul 1, 2018 3296
WHAT YOU NEED TO KNOW ABOUT CRYPTOCURRENCY, BITCOIN, AND THE BLOCKCHAIN: And why all of it is relevant to your business. Wilkes, Clay Jul 1, 2018 2134
Return of the Technical Control and Analysis Elements for Theater Signals Intelligence Support. Hammon, Scott R. Reprint Jul 1, 2018 1882
Improved Contrast for Threshold Random-grid-based Visual Cryptography. Hu, Hao; Shen, Gang; Fu, Zhengxin; Yu, Bin Report Jul 1, 2018 8180
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. Li, Wei; Ge, Chenyu; Gu, Dawu; Liao, Linfeng; Gao, Zhiyong; Shi, Xiujin; Lu, Ting; Liu, Ya; Liu, Zhi Report Jul 1, 2018 7277
w-Bit Shifting Non-Adjacent Form Conversion. Hwang, Doo-Hee; Choi, Yoon-Ho Report Jul 1, 2018 8781
Blockchain Audit Trail Comes to Pharma: A cryptographic 'fingerprint' provides tamperproof logs for equipment audits. Botta, Mike; Eschbach, Andreas Cover story Jul 1, 2018 2694
KT to Bring Next Tech Revolution to Space and North Korea. Jun 30, 2018 554
Network Security and Cryptography. Brief article Jun 1, 2018 122
Network Security and Cryptography. Brief article Jun 1, 2018 111
Popular encrypted email standards are unsafe. May 14, 2018 697
Stay away from bitcoin. May 13, 2018 932
Network Security and Cryptography: A Self-Teaching Introduction. Brief article May 1, 2018 108
Bitcoin, Cryptocurrencies, Blockchain, Real Estate and the UAE. Apr 30, 2018 2637
What is digital currency? Wadsworth, Amber Apr 15, 2018 4931
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. Reyes, Ariel Roy L.; Festijo, Enrique D.; Medina, Ruji P. Report Apr 1, 2018 4568
Improving Vehicular Authentication in VANET using Cryptography. Al-Mutiri, Rasha; Al-Rodhaan, Mznah; Tian, Yuan Report Apr 1, 2018 5562
A New Scheme to Secure Communication and Data, based on the Integration of Cryptography and Steganography. Dehkordi, Massoud Hadian; Asgari, Amin; Moradian, Ali Report Apr 1, 2018 2951
TaaS Launches the Updated Cryptographic Audit, Cornerstone of Its Declaration of Transparency. Mar 28, 2018 474
Circulant UOV: a new UOV variant with shorter private key and faster signature generation. Peng, Zhiniang; Tang, Shaohua Report Mar 1, 2018 9646
AGREEMENT ALLOWS ACCESS TO DPA COUNTERMEASURES. Mar 1, 2018 318
PERFECT ONLINE PRIVACY: A tool developed for blockchains makes it possible to carry out a digital transaction without revealing any more Information than absolutely necessary. Orcutt, Mike Mar 1, 2018 336
Businesswoman Amanda's innovative work earns top honour. Feb 22, 2018 246
Explore machine learning, cryptography and the latest trends in the Python Ecosystem at PyCon PH 2018. Feb 19, 2018 489
The bitcoin revolution. Feb 15, 2018 1436
When to use blockchain for security purposes. Feb 11, 2018 1595
YouBase, Toda-Algorand advance cryptographic technology. Feb 6, 2018 171
YouBase, Toda-Algorand advance cryptographic technology. Feb 6, 2018 162
YouBase, Toda-Algorand advance cryptographic technology. Feb 6, 2018 171
Standards committee seeks computing, cryptography experts. Jan 30, 2018 132
OTI accepts cryptocurrency as source of purchase payment. Jan 12, 2018 182
2018 Levchin Prize recipients announced. Jan 12, 2018 417
OTI accepts cryptocurrency as source of purchase payment. Jan 12, 2018 180
2018 Levchin Prize recipients announced. Jan 12, 2018 408
2018 Levchin Prize recipients announced. Jan 12, 2018 417
Xerox AltaLink Devices Achieve Common Criteria Certification. Jan 7, 2018 569
Critical Analysis of Hash Based Signature Schemes. Gagnidze, A.; Iavich, M.; Inasaridze, N.; Iashvili, G.; Vyalkova, V. Report Jan 1, 2018 3150
Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives. Asimi, Younes; Asimi, Ahmed; Tbatou, Zakariae; Guezzaz, Azidine; Sadqi, Yassine Report Jan 1, 2018 3328
An Efficient Stream Data Processing Model for Multiuser Cryptographic Service. Li, Li; Li, Fenghua; Shi, Guozhen; Geng, Kui Jan 1, 2018 6709
Combining Cryptography with EEG Biometrics. Damasevicius, Robertas; Maskeliunas, Rytis; Kazanavicius, Egidijus; Wozniak, Marcin Report Jan 1, 2018 7811
Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings. Gao, Ronghai; Zeng, Jiwen; Deng, Lunzhi Jan 1, 2018 11323
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec. Yang, Ximin; Wang, Deqiang; Feng, Wei; Wu, Jingjing; Tang, Wan Jan 1, 2018 5536
Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem. Liu, Zeyu; Xia, Tiecheng; Wang, Jinbo Jan 1, 2018 6627
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments. Park, Cheolhee; Kim, Hyunil; Hong, Dowon; Seo, Changho Jan 1, 2018 12899
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN. Lara-Nino, Carlos Andres; Diaz-Perez, Arturo; Morales-Sandoval, Miguel Jan 1, 2018 9358
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment. Zhao, Yan; Li, Shiming; Jiang, Liehui Jan 1, 2018 10069
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. Park, Taehwan; Seo, Hwajeong; Kim, Junsub; Park, Haeryong; Kim, Howon Jan 1, 2018 6607
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. Huang, Qinlong; He, Yue; Yue, Wei; Yang, Yixian Jan 1, 2018 7208
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing. Xiao, Chunhua; Zhang, Lei; Xie, Yuhua; Liu, Weichen; Liu, Duo Jan 1, 2018 12498
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Zhang, Pei; Zhang, Wenying Jan 1, 2018 5830
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. Chen, Yanan; Lu, Zhenyu; Xiong, Hu; Xu, Weixiang Jan 1, 2018 11086
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption. Xiao, Dianyan; Yu, Yang Jan 1, 2018 7663
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. Li, Li; Zhou, Siqin; Choo, Kim-Kwang Raymond; Li, Xiaohong; He, Debiao Jan 1, 2018 8398
Applied Cryptography and Noise Resistant Data Security. Hussain, Iqtadar; Ahmed, Fawad; Khokhar, Umar M.; Anees, Amir Jan 1, 2018 867
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem. An, Youngjoo; Lee, Hyang-Sook; Lee, Juhee; Lim, Seongan Jan 1, 2018 12573
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos. Siordia, Octavio Flores; Gutierrez, Juan Carlos Estrada; Leyferman, Carlos Eduardo Padilla; Santiago Jan 1, 2018 6438
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF([2.sup.m]) Based on Montgomery Arithmetic. Schramm, Martin; Dojen, Reiner; Heigl, Michael Jan 1, 2018 13867
Quantum Cryptography for the Future Internet and the Security Analysis. Zhou, Tianqi; Shen, Jian; Li, Xiong; Wang, Chen; Shen, Jun Jan 1, 2018 4247
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT. Luo, Ming; Luo, Yi; Wan, Yuwei; Wang, Ze Jan 1, 2018 8350
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Yuan, Ye; Xiao, Junting; Fukushima, Kazuhide; Kiyomoto, Shinsaku; Takagi, Tsuyoshi Jan 1, 2018 9215
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification. Kang, Baoyuan; Si, Lin; Jiang, Hong; Li, Chunqing; Xie, Mingming Jan 1, 2018 4676
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. Zhang, Qi; Wang, An; Niu, Yongchuan; Shang, Ning; Xu, Rixin; Zhang, Guoshuang; Zhu, Liehuang Jan 1, 2018 8207
Efficient Compression and Encryption for Digital Data Transmission. Carpentieri, Bruno Jan 1, 2018 5704
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks. Coruh, Ugur; Bayat, Oguz Jan 1, 2018 15800
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT. Jiang, Liaoliang; Li, Tong; Li, Xuan; Atiquzzaman, Mohammed; Ahmad, Haseeb; Wang, Xianmin Jan 1, 2018 6200
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks. Zhang, Ke; Xu, Kai; Wei, Fushan Jan 1, 2018 7670
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography. Li, Zengpeng; Xiang, Can; Wang, Chengyu Jan 1, 2018 8593
An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks. Xu, Cheng; Huang, Xiaohong; Ma, Maode; Bao, Hong Jan 1, 2018 10450
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Li, Ye; Jiang, Zoe L.; Wang, Xuan; Fang, Junbin; Zhan, En; Wang, Xianmin Jan 1, 2018 7317
Storage Made Easy Announces FIPS 140-2 U.S. Federal Government Validation of Its Enterprise File Fabric[TM] Cryptographic Algorithm. Dec 19, 2017 550
State of the Art in Biometric Key Binding and Key Generation Schemes. Jegede, Abayomi; Udzir, Nur Izura; Abdullah, Azizol; Mahmod, Ramlan Report Dec 1, 2017 10433
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform. Khalil, M.I. Report Dec 1, 2017 5118
University of Nicosia to record degrees using cryptography. Nov 2, 2017 303
New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography. Su, Pin-Chang; Tsai, Chien-Hua Report Nov 1, 2017 10181
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. Deng, Lunzhi; Yang, Yixian; Chen, Yuling Report Nov 1, 2017 7509
MONEY TRADE COIN CRYPTOCURRENCY. Oct 31, 2017 705
Enova Technology Receives FIPS 140-2 Level 3 Validation for X-Wall MX+ Cryptographic Modules. Oct 27, 2017 431
A Survey On Medical Image Protection Using Various Steganography Techniques. Santhi, G.; Adithya, B. Report Oct 1, 2017 2692
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. Yu, Haiyang; Cai, Yongquan; Kong, Shanshan; Ning, Zhenhu; Xue, Fei; Zhong, Han Report Oct 1, 2017 9318
Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field. Fujdiak, Radek; Dzurenda, Petr; Mlynek, Petr; Misurec, Jiri; Orgon, Milos; Sergey, Bezzateev Report Oct 1, 2017 5751
Towards Designing Efficient Lightweight Ciphers for Internet of Things. Tausif, Muhammad; Ferzund, Javed; Jabbar, Sohail; Shahzadi, Raheela Report Aug 1, 2017 6960
Modern Cryptography and Elliptic Curves: A Beginner's Guide. Book review Aug 1, 2017 113
Quaternion-based encryption/decryption of audio signal using digital image as a variable key. Khalil, M.I. Report Aug 1, 2017 3975
National cryptologic museum debuts service & sacrifice, real time regional gateway exhibits. Jul 1, 2017 1223
The junior officer cryptologic career program. Nicklas, Brian; Wingo, Philip; Wollenburg, Christian Jul 1, 2017 1348
Warrant officer cryptologic career program. King, Shawn; Black, Dubby Jul 1, 2017 2793
The NSA director's fellowship. Fair, Jeffrey; Maguinness, Angelina; Christmas, Geoff Jul 1, 2017 1948
Middle enlisted cryptologic career advancement program. Pifer, Lee J. Jul 1, 2017 1196
Military occupational specialty specific enlisted cryptologic internship programs. Costa, Jeffrey; Shain, Kristie; Droutsas, Paul; Spence, Marshall Jul 1, 2017 2311
SPCBC: A Secure Parallel Cipher Block Chaining mode of operation based on logistic chaotic map. El-Semary, Aly M.; Azim, Mohamed Mostafa A.; Diab, Hossam Report Jul 1, 2017 9448
New construction of short certificate-based signature against existential forgery attacks. Lu, Yang; Wang, Gang; Li, Jiguo; Shen, Jian Report Jul 1, 2017 11901
Fully verifiable algorithm for secure outsourcing of bilinear pairing in cloud computing. Dong, Min; Ren, Yanli; Zhang, Xinpeng Report Jul 1, 2017 7072
AKA-PLA: Enhanced AKA based on physical layer authentication. Yang, Jing; Ji, Xinsheng; Huang, Kaizhi; Yi, Ming; Chen, Yajun Report Jul 1, 2017 6883
IARPA program seeks more efficient data security. Machi, Vivienne Jul 1, 2017 434
A10 Networks strengthens cryptographic solutions portfolio. Jun 11, 2017 339
HS-Sign: A security enhanced UOV signature scheme based on hyper-sphere. Chen, Jiahui; Tang, Shaohua; Zhang, Xinglin Report Jun 1, 2017 10327
Weak Cryptographic Policies Increase CU Cyberrisks. May 31, 2017 641
Ram Group announces breakthrough in creating world's first full-body biometric authentication technology. May 11, 2017 323
Ram Group announces breakthrough in creating world's first full-body biometric authentication technology. May 11, 2017 327
WEAK CRYPTOGRAPHIC SECURITY CONTROLS EPIDEMIC. May 1, 2017 622
Enhanced multicomponent data secure mechanism for cloud storage system using elliptical curve cryptography. Britto, A. Lauro Eugin; Maheshwari, N. Uma Report May 1, 2017 3904
Area efficiency and high speed implementation of cryptography using hash function and RSA algorithm. Jayakumar, S.; Sumathi, A.; Kumar, P. Santhosh; Suganthan, M.; Hanies, S. Syed Apr 30, 2017 2449
Cryptographic enhanced shared data on conserve encipher text update in cloud computing. Dhanabal, E.; Harish, G.; YogaDinesh, S.; Ambethkumar, V.D.; Rajendiran, M. Report Apr 30, 2017 3605
EFFECT OF THE NUMBER OF TAPPING BITS OF THE A5/1 STREAM CIPHER TOWARDS HARDWARE PERFORMANCE. Fauzi, S.Y.A.M.; Othman, M.; Shuib, F.M.M.; Seman, K. Report Apr 30, 2017 3146
A survival study of security attacks, security mechanisms and security challenges in network security. Jayasmruthi, A.; Parthasarathi, P.; Sathishkumar Report Apr 15, 2017 3948
Detection of vulnerable activity in social network and websites using steganalysis: a cryptography technique. Sivaparthipan, C.B.; Karthikeyan, N.; BalaAnand, M.; Karthik, S. Report Apr 1, 2017 1923
Efficient and secure certificateless proxy re-encryption. Liu, Ya; Wang, Hongbing; Wang, Chunlu Report Apr 1, 2017 13369
SK Telecom, Deutsche Telekom establish alliance for worldwide quantum-safe network ecosystem. Mar 1, 2017 363
SK Telecom, Deutsche Telekom establish alliance for worldwide quantum-safe network ecosystem. Mar 1, 2017 363
WhatsApp Reportedly Has Security Backdoor, But There's Nothing To Fear. Jan 13, 2017 667
Reviewing and Analyzing Efficient GCD/LCM Algorithms for Cryptographic Design. Marouf, Ibrahim; Asad, Mohamad Musab; Al-Haija, Qasem Abu Report Jan 1, 2017 2367
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform. Koppu, Srinivas; Viswanatham, V. Madhu Report Jan 1, 2017 7899
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding. Sheela, S.J.; Suresh, K.V.; Tandur, Deepaknath Report Jan 1, 2017 6195
Algebraic Cryptanalysis Scheme of AES-256 Using Grobner Basis. Zhao, Kaixin; Cui, Jie; Xie, Zhiqiang Report Jan 1, 2017 5798
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP. Ibrahim, Alaauldin; Dalkilic, Gokhan Jan 1, 2017 6936
An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing. Hu, Jin-Xin; Chen, Chin-Ling; Fan, Chun-Long; Wang, Kun-hao Jan 1, 2017 6003
Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues. Ishmanov, Farruh; Zikria, Yousaf Bin Jan 1, 2017 13623
Chaotic S-Box: Intertwining Logistic Map and Bacterial Foraging Optimization. Tian, Ye; Lu, Zhimao Report Jan 1, 2017 7475
A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model. Zhang, Yingying; Zeng, Jiwen; Li, Wei; Zhu, Huilin Report Jan 1, 2017 7675
Design of Initial Value Control for Modified Lorenz-Stenflo System. Wu, Yuan-Long; Yang, Cheng-Hsiung; Wu, Chang-Hsi Report Jan 1, 2017 2114
Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Order Form. Kingni, Sifeu Takougang; Kuiate, Gaetan Fautso; Kengne, Romanic; Tchitnga, Robert; Woafo, Paul Report Jan 1, 2017 7134
Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium. Wang, Xiong; Akgul, Akif; Kacar, Sezgin; Pham, Viet-Thanh Report Jan 1, 2017 4305
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Pereira, Geovandro C.C.F.; Alves, Renan C.A.; da Silva, Felipe L.; Azevedo, Roberto M.; Albertini, B Report Jan 1, 2017 10469
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Dong, Jiankuo; Zheng, Fangyu; Pan, Wuqiong; Lin, Jingqiang; Jing, Jiwu; Zhao, Yuan Report Jan 1, 2017 10451
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. Ren, Yanli; Dong, Min; Niu, Zhihua; Du, Xiaoni Report Jan 1, 2017 6389
RFA: R-Squared Fitting Analysis Model for Power Attack. Wang, An; Zhang, Yu; Zhu, Liehuang; Tian, Weina; Xu, Rixin; Zhang, Guoshuang Report Jan 1, 2017 4900
How to Share Secret Efficiently over Networks. Ham, Lein; Hsu, Ching-Fang; Xia, Zhe; Zhou, Junwei Report Jan 1, 2017 5250
Improvements for Finding Impossible Differentials of Block Cipher Structures. Luo, Yiyuan; Lai, Xuejia Report Jan 1, 2017 7563
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Li, Ji; Wei, Jianghong; Liu, Wenfen; Hu, Xuexian Report Jan 1, 2017 10745
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Han, Gang; Yu, Yu; Li, Xiangxue; Zhou, Qifeng; Zheng, Dong; Li, Hui Report Jan 1, 2017 6097
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. Mikhail, Mervat; Abouelseoud, Yasmine; ElKobrosy, Galal Report Jan 1, 2017 7387
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo. Han, Guoyong; Zhang, Wenying Report Jan 1, 2017 6165
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents. Tsai, Chien-Hua; Su, Pin-Chang Report Jan 1, 2017 10708
Novel Noncommutative Cryptography Scheme Using Extra Special Group. Kumar, Gautam; Saini, Hemraj Report Jan 1, 2017 12931
Protecting Information with Subcodstanography. Kohler, Mirko; Lukic, Ivica; Cik, Visnja Krizanovic Report Jan 1, 2017 8130
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. Ma, Rong; Cao, Zhenfu; Wang, Xingkai Report Jan 1, 2017 6310
Building Secure Public Key Encryption Scheme from Hidden Field Equations. Ping, Yuan; Wang, Baocang; Yang, Yuehua; Tian, Shengli Report Jan 1, 2017 4115
Efficient Secure Multiparty Subset Computation. Zhou, Sufang; Li, Shundong; Dou, Jiawei; Geng, Yaling; Liu, Xin Report Jan 1, 2017 9762
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography. He, Debiao; Zeadally, Sherali; Wang, Huaqun; Liu, Qin Report Jan 1, 2017 8455
Ultra-Secure Cryptographic Network Node: Sandia National Laboratories. Dec 1, 2016 166
Pseudonym-based privacy protection scheme for participatory sensing with incentives. Zhang, Junsong; He, Lei; Zhang, Qikun; Gan, Yong Report Nov 1, 2016 11382
How DoD is using the risk management framework to assess operational risk for decertified cryptographic algorithms. Correia, J. Steve Oct 1, 2016 2319
Decode Abe's secret messages. Brief article Sep 19, 2016 140
Leveraging Cryptographic Ledgers in the Internet of Everything Blockchain World Congress 2016 NYC - USA. Sep 11, 2016 382
Efficient signature schemes from R-LWE. Wang, Ting; Yu, Jianping; Zhang, Peng; Zhang, Yong Report Aug 1, 2016 6453
BOEING LICENSES RAMBUS DPA COUNTERMEASURES. Aug 1, 2016 412
Google Experiment Hopes To Prevent Quantum Hacking. Jul 8, 2016 315
Enhancing the security of electronic medical records using forward secure secret key encryption scheme. Kapis, Kosmas; Kambo, Edwin Report Jul 1, 2016 3404
A novel randomised cryptographic technique. Pradeep, S. Eben Gnana; Velusamy, S.; Murugan, R. Anandha Jun 30, 2016 2885
Lightweight encryption design for embedded security. Anupama, G.; Iyappan, M.; Karpagam, M. Report Jun 15, 2016 2654
Analysis and implementation of cryptographic hash functions in programmable logic devices/Kriptografiniu maisos funkciju igyvendinimo programuojamosios logikos lustuose tyrimas. Brukstus, Tautvydas Report Jun 1, 2016 2267
RSA-type algebra structures. Tran, Long D.; Tran, Thu D.; Choi, Deokjai; Nguyen, Thuc D. Report Jun 1, 2016 6127
What to do after a ransomware attacks. Valach, Anthony P. Jun 1, 2016 1344
The swift and secret messenger: John Wilkins's Mercury and the paradoxes of language. Laczynska, Klaudia Critical essay Jun 1, 2016 6482
Apple Rehires Security Expert Jon Callas. May 25, 2016 455
Impossible differential cryptanalysis on DVB-CSA. Zhang, Kai; Guan, Jie; Hu, Bin Report Apr 1, 2016 4828
New cryptology training readies sailors for fleet missions. Apr 1, 2016 642
Turing Award For Cryptography. Mar 9, 2016 547
DarkMatter steps into secure communications market. Feb 18, 2016 174
DarkMatter steps into secure communications market. Feb 18, 2016 164
DarkMatter steps into secure communications market. Feb 18, 2016 174
DarkMatter introduces secure Voice and Chat application. Feb 18, 2016 524
HissenIT Published Application Security and Cryptography Online Trainings. Feb 6, 2016 204
Enhanced certificate-based encryption scheme without bilinear pairings. Lu, Yang; Zhang, Quanling Report Feb 1, 2016 9829
A novel authenticated group key distribution scheme. Shi, Run-hua; Zhong, Hong; Zhang, Shun Report Feb 1, 2016 6528
Fujitsu, Others Develop High-Speed Authentication Technology for Encrypted Communications with IoT Devices. Jan 19, 2016 1425
Simpler efficient group signature scheme with verifier-local revocation from lattices. Zhang, Yanhua; Hu, Yupu; Gao, Wen; Jiang, Mingming Report Jan 1, 2016 10804
Topology-hiding broadcast based on NTRUEncrypt. Mi, Bo; Liu, Dongyan Report Jan 1, 2016 5252
A discrete wavelet transform approach for enhanced security in image steganography. S. Kelsey, Ashley; M. Akujuobi, Cajetan Report Jan 1, 2016 4162
A Secure Network Coding Based on Broadcast Encryption in SDN. Chen, Yue; Jia, Hongyong; Huang, Kaixiang; Lan, Julong; Yan, Xincheng Jan 1, 2016 5956
Multi-party Password-Authenticated Key exchange scheme with privacy preservation for mobile environment. Lu, Chung-Fu Report Dec 1, 2015 7265
Remote login authentication scheme based on bilinear pairing and fingerprint. Kumari, Shipra; Om, Hari Report Dec 1, 2015 12578
Pitfalls in ultralightweight RFID authentication protocol. Mujahid, Umar; Najam-ul-islam, Muhammad Report Dec 1, 2015 7237
Taking the sting out of the Stingray: the dangers of cell-site simulator use and the role of the Federal Communications Commission in protecting privacy & security. Norman, Jason Dec 1, 2015 18519
A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy Report Oct 1, 2015 11204
High performance and efficient secure communication in wireless sensor network with non-linear S-box using AES-CCMP. Ramakrishnan, Velayutham; Elango, Siva Ganesh Report Sep 1, 2015 3227
Implementation of duplicate TRNG on FPGA by using two different randomness source. Tuncer, Taner Report Aug 1, 2015 4069
A method to encrypt information with DNA-based cryptography. Najaftorkaman, Mohammadreza; Kazazi, Nazanin Sadat Report Jul 1, 2015 5116
The state of cryptocurrencies, their issues and policy interactions. Subramanian, Ramesh; Chino, Theo Report Jul 1, 2015 6816
Multimodal biometric key generation for cryptographic security using face and iris. Balamurugan, G.; Jayarraman, K.B.; Arulalan, V.; Lokesh, V. Report Jun 1, 2015 2513
A novel image encryption using calligraphy based scan method and random number. Sivakumar, T.; Venkatesan, R. Report Jun 1, 2015 8149
A secure method for color image steganography using gray-level modification and multi-level encryption. Muhammad, Khan; Ahmad, Jamil; Farman, Haleem; Jan, Zahoor; Sajjad, Muhammad; Baik, Sung Wook Report May 1, 2015 8524
INTERTRUST INTEGRATES SECURITY CORES FROM RAMBUS. May 1, 2015 678
Attribute set based signature secure in the standard model. Li, Baohong; Zhao, Yinliang; Zhao, Hongping Report Apr 1, 2015 6588
On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography. Kaur, Prabhdeep; Kalra, Sheetal Report Apr 1, 2015 5579
Security analysis of the lightweight cryptosystem TWINE in the Internet of Things. Li, Wei; Zhang, Wenwen; Gu, Dawu; Tao, Zhi; Zhou, Zhihong; Liu, Ya; Liu, Zhiqiang Report Feb 1, 2015 7409
An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Malhi, Avleen Kaur; Batra, Shalini Report Jan 1, 2015 12276
Zero-correlation linear cryptanalysis of reduced round ARIA with Partial-sum and FFT. Yi, Wen-Tan; Chen, Shao-Zhen; Wei, Kuan-Yang Report Jan 1, 2015 7781
An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Malhi, Avleen Kaur; Batra, Shalini Report Jan 1, 2015 12235

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters