27   Artículos

 
en línea
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed    
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yongseok Lee, Jonghee Youn, Kevin Nam, Hyunyoung Oh and Yunheung Paek    
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography. The NTRU-KEM, while ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Marin Vidakovic and Kruno Milicevic    
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Tyler Cultice and Himanshu Thapliyal    
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anastasiya Ilyukhina     Pág. 16 - 27
In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its implem... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Fazal Raheman    
The first week of August 2022 saw the world?s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a rigoro... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rameez Asif    
The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost ... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg and Jordan Wright    
Using physical unclonable functions (PUFs), in support of networks secured with a public key infrastructure, to generate, on demand, the key pairs needed for lattice and code PQC algorithms.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Donghoe Heo, Suhri Kim, Young-Ho Park and Seokhie Hong    
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange al... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »