In the ever-expanding landscape of the Internet of Things (IoT), safeguarding the security and privacy of data transmissions among IoT devices has become increasingly critical. This research introduces an innovative a...
详细信息
This paper presents a technique for ensuring secure communication between interconnected devices using the Serial Peripheral Interface (SPI) protocol. The method combines the strengths of the Physical Unclonable Funct...
详细信息
This article evaluates the possibility of using Russian Standardized Crypto algorithms (also known as GOST algorithms) in the QUIC transport protocol. The conclusion is that it is generally feasible to use these algor...
详细信息
This article evaluates the possibility of using Russian Standardized Crypto algorithms (also known as GOST algorithms) in the QUIC transport protocol. The conclusion is that it is generally feasible to use these algorithms in QUIC, provided that some additional tasks, identified in this article, are completed. The article also identifies potential problems with some GOST algorithms when used in QUIC.
In order to solve the problem of researching the distribution of returns on trustworthy "dual contribution" data assets, the authors propose a research on the distribution mechanism of returns on trustworthy...
详细信息
With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. Secure communication based on physical layer encryption em...
详细信息
We introduce new lattice-based techniques for building ABE for circuits with unbounded attribute length based on the LWE assumption, improving upon the previous constructions of Brakerski and Vaikuntanathan (CRYPTO 16...
详细信息
ISBN:
(纸本)9789819608935;9789819608942
We introduce new lattice-based techniques for building ABE for circuits with unbounded attribute length based on the LWE assumption, improving upon the previous constructions of Brakerski and Vaikuntanathan (CRYPTO 16) and Goyal, Koppula, and Waters (TCC 16). Our main result is a simple and more efficient unbounded ABE scheme for circuits where only the circuit depth is fixed at set-up;this is the first unbounded ABE scheme for circuits that rely only on blackbox access to cryptographic and lattice algorithms. The scheme achieves semi-adaptive security against unbounded collusions under the LWE assumption. The encryption time and ciphertext size are roughly 3x larger than the prior bounded ABE of Boneh et al. (EUROCRYPT 2014), substantially improving upon the encryption times in prior works. As a secondary contribution, we present an analogous result for unbounded inner product predicate encryption that satisfies weak attribute-hiding.
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a p...
详细信息
ISBN:
(纸本)9789819608904;9789819608911
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a precise field operation count. We present a constant time implementation of our algorithm in Rust and an alternative implementation in SageMath. Our work in SageMath runs ten times faster than a comparable implementation of an isogeny chain using the Richelot correspondence. The Rust implementation runs up to forty times faster than the equivalent isogeny in SageMath and has been designed to be portable for future research in higher-dimensional isogeny-based cryptography.
Currently, protecting personal privacy through selective encryption of facial images has become a research hotspot. This paper aims to design a new image encryption scheme using chaotic systems, optimization algorithm...
详细信息
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks. Cryptographic algorithm iden...
详细信息
This paper uses reconfigurable hardware (Field-Programmable Gate Array (FPGA) board) for security implementation, which has less complexity, more flexibility, and yields more efficiency. The Data encryption Standard (...
详细信息
暂无评论