In the field of computer science and engineering, hardware acceleration and encryption are key technologies for improving computing power and ensuring information security. FPGAs can be used to accelerate core algorit...
详细信息
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi...
详细信息
The Internet Service Providers (ISP), and their structures are at high risk with the growing quantity and complexity of cyber threats. The growth of quantum computing further elevates the risks and challenges especial...
详细信息
Facing the threat of quantum computing to cryptography schemes, it is urgent to study the applications of quantum algorithms to cryptanalysis and evaluate the security of cryptographic schemes in a quantum computing e...
详细信息
In this paper, we review lightweight security approaches for resource-constrained IoT devices. Previous research has explored various lightweight cryptographic algorithms, such as PRESENT, PRIDE, SNOW-V, and ChaCha20 ...
详细信息
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens...
详细信息
Comfy records transmission is a crucial generation in the data safety area. It entails the use of cryptographic algorithms to secure statistics in order that it cannot be accessed without authorization. Cryptography a...
详细信息
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the nu...
详细信息
This paper explores the performance of implemented cryptography algorithms used for various blockchain technologies, which include Bitcoin, Ethereum, and Hyperledger. Diverse techniques for assessing cryptographic alg...
详细信息
This paper proposes a blockchain privacy encryption scheme based on CRT-RSA algorithm. This encryption scheme decomposes the large integer modular operation of RSA algorithm into two smaller modular operations, which ...
详细信息
暂无评论