This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u...
详细信息
Advanced encryption Standard (AES) is one of the most widely used symmetric cipher for the confidentiality of data. Also it is used for other security services, viz. integrity, authentication and key establishment. Ho...
详细信息
With the widespread application of domestic commercial cryptographic algorithms and the advancement of commercial cryptographic application evaluation, the compliance of these algorithms has garnered significant atten...
详细信息
Darknet refers to an overlay network that requires the use of special software to access. Tor (The Onion Router) is one of the software used to access the darknet. Tor uses unique routing methods and encryption algori...
详细信息
Hardness amplification is one of the important reduction techniques in cryptography, and it has been extensively studied in the literature. The standard XOR lemma known in the literature evaluates the hardness in...
详细信息
We investigate the notion of bit-security for decisional cryptographic properties, as originally proposed in (Micciancio & Walter, Eurocrypt 2018), and its main variants and extensions, with the goal clarifying th...
详细信息
Secure hash algorithm plays a major role to achieve the integrity in secure data communication. The SHA-3 is the recent crypto hash algorithm recognized by national institute of standards and technology. This paper pr...
详细信息
With increasing cyber threats, secure authentication of users in machine learning systems has never been more necessary. In this paper, we develop the CipherKeyX Algorithm: A novel cryptographic block cipher able to r...
详细信息
This paper presents an analysis of a cryptographic algorithm based on integer multinumbers. We discuss the quantum-resistance of this algorithm, and some questions related to its security. In particular, we consider t...
详细信息
In the ever-evolving field of cybersecurity, randomness plays a critical role in cryptographic systems. Traditional pseudo-random number generators, while widely used, can be vulnerable to attacks due to their determi...
详细信息
暂无评论