This work considered the improvement of the RSA cryptosystem using a Secure Hash Algorithm, SHA-256, in its attempt to forestall attacks, more so against timing attacks. RSA is one of the most used asymmetric encrypti...
详细信息
In this paper, we discuss the challenges of quantum computing to traditional cryptography and the latest development of post-quantum cryptography as a coping strategy. As quantum computing advances, cryptographic algo...
详细信息
The rapid advancements in quantum computation pose significant threats to traditional cryptographic systems, such as those used in the Internet of Things (IoT). RSA and methods like Elliptic Curve Cryptography (ECC) a...
详细信息
A Python optimization method is proposed to ad-dress the slow and inefficient encryption speed of third-party libraries (gmssl and pysmx) commonly used in Python to im-plement national security encryption algorithms. ...
详细信息
This article presents a new cryptographic technique combining Soham transformation technique with congruence modulo operator for improving the security of data. The method utilises mathematical formulas to code and de...
详细信息
The development of a digital signature algorithm based on elliptic curves, which is based on the basic models of asymmetric cryptography, confirms the increased security of the authentication procedure, which in turn ...
详细信息
The main aim of the paper is to evaluate and compare the hardware implementation of three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus to determine their efficiency and suitability for IoT enviro...
详细信息
Agriculture sector is considered to be one of the most prominent sectors in the Indian economy. Farmers constantly face challenges such as a lack of information on best practices, disease detection, and market informa...
详细信息
The security of IoT applications remains one of the biggest challenges, given that the vast majority of applications are developed on devices with limited computational resources and interconnected by the Internet. By...
详细信息
As the advent of quantum computing looms, the cryptographic landscape faces unprecedented challenges that could render traditional algorithms like AES, RSA, and ECC vulnerable. This paper delves into a comparative stu...
详细信息
暂无评论