Secure fiber-optic communication systems are an important area of research and development in the IT industry. In this work, we report the development of a promising fiber laser system for physical-layer secure key ge...
详细信息
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte...
详细信息
We provide explicit radical N-isogeny formulae for all odd integers N. The formulae are compact closed-form expressions which require one Nth root computation and O(N) basic field operations. The formulae are highly e...
详细信息
All digital information exchange is not free from security threats in terms of information exchange, so a technique or method is needed to make message exchange in today's all-digital era safer. Therefore, this re...
详细信息
Since the arrival of devices connected to the Internet, cryptographic goals have become a constant challenge for cybersecurity specialists. Data transmitted between IoT devices can become sensitive depending on the ap...
详细信息
R-Ate pair is an important bilinear mapping in state secret SM9 cryptographic algorithm, and its computational efficiency is closely related to the implementation performance of SM9. This scheme uses variable-length M...
详细信息
The paper describes the construction of nonlinear cryptographic protocol, based on separate linear cryptosystems. Implementation of suggested construction scheme enables encryption of data blocks with ready-made and p...
详细信息
An end-to-end encrypted chatting application focuses on securely transmitting sensitive information. It prevents the intrusion of malicious parties with any ill intent. It is especially needed in organizations where e...
详细信息
Today, hashing algorithms are employed in many applications for security purposes. Many developments have been made in the family of hashing algorithms, especially the SHA1 algorithm. Because of flaws in the past year...
详细信息
Due to the advent of polynomial time quantum algorithms to solve well-known hard mathematical problems, various secure cryptographic primitives are vulnerable against large quantum computers. However, no such quantum ...
详细信息
暂无评论