17   Artículos

 
en línea
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed    
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yongseok Lee, Jonghee Youn, Kevin Nam, Hyunyoung Oh and Yunheung Paek    
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography. The NTRU-KEM, while ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Tyler Cultice and Himanshu Thapliyal    
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.... ver más
Revista: Information    Formato: Electrónico

 
en línea
Fazal Raheman    
The first week of August 2022 saw the world?s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a rigoro... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rameez Asif    
The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost ... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Tsung-Hung Lin and Ming-Te Chen    
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova     Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim and Seog Chung Seo    
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems ha... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Eduard Primenko,Andrey Rybkin     Pág. 11 - 22
 In this paper, we survey a cryptographic direction of post-quantum cryptography based on logarithmic signatures and covers of finite groups. These mathematical structures allows designing cryptosystems with security based on hardness of the factori... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »