In this paper, we propose a histogram publication algorithm HP-SDP (histogram publication with shuffled differential privacy) for the existing histogram publication methods, which is difficult to effectively balance t...
详细信息
Factoring large numbers poses a significant chal-lenge in contemporary cryptography and security practices. Shor's algorithm presents a remarkable advancement over clas- sical methods by providing exponential acce...
详细信息
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens...
详细信息
In this paper we will look at how quantum computers solve problems used in modern cryptographic systems, and what post-quantum cryptographic systems exist. We focus on the scheme, that developed in the direction of mu...
详细信息
This paper describes a developed system of secured user credentials transfer from a user’s web browser to a web application server. This paper will describe in detail the operation of an advanced 10-level encryption ...
详细信息
Secure fiber-optic communication systems are an important area of research and development in the IT industry. In this work, we report the development of a promising fiber laser system for physical-layer secure key ge...
详细信息
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the nu...
详细信息
This paper proposes a blockchain privacy encryption scheme based on CRT-RSA algorithm. This encryption scheme decomposes the large integer modular operation of RSA algorithm into two smaller modular operations, which ...
详细信息
This paper explores the performance of implemented cryptography algorithms used for various blockchain technologies, which include Bitcoin, Ethereum, and Hyperledger. Diverse techniques for assessing cryptographic alg...
详细信息
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte...
详细信息
暂无评论