Добірка наукової літератури з теми "Standard Cryptosystems"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Standard Cryptosystems".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Standard Cryptosystems"
Arboleda, Edwin Romeroso, Carla Eunice R. Fenomeno, and Joshua Z. Jimenez. "KED-AES algorithm: combined key encryption decryption and advance encryption standard algorithm." International Journal of Advances in Applied Sciences 8, no. 1 (March 1, 2019): 44. http://dx.doi.org/10.11591/ijaas.v8.i1.pp44-53.
Повний текст джерелаMurillo-Escobar, Miguel Angel, Manuel Omar Meranza-Castillón, Rosa Martha López-Gutiérrez, and César Cruz-Hernández. "Suggested Integral Analysis for Chaos-Based Image Cryptosystems." Entropy 21, no. 8 (August 20, 2019): 815. http://dx.doi.org/10.3390/e21080815.
Повний текст джерелаA., Manikandan, and Anandan R. "Hybrid Facial Chaotic-based Graphical Encryption Technique for Cloud Environment." Webology 19, no. 1 (January 20, 2022): 3643–56. http://dx.doi.org/10.14704/web/v19i1/web19240.
Повний текст джерелаLabao, Alfonso, and Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage." Cryptography 6, no. 1 (January 4, 2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Повний текст джерелаZimmermann. "A Proposed Standard Format for RSA Cryptosystems." Computer 19, no. 9 (September 1986): 21–34. http://dx.doi.org/10.1109/mc.1986.1663326.
Повний текст джерелаK, Subhashini, Aarthi Lakshmi R, Arthi V, and Hemalatha G. "Image Encryption using Convolutional Neural Network." ITM Web of Conferences 56 (2023): 05005. http://dx.doi.org/10.1051/itmconf/20235605005.
Повний текст джерелаHemasri, S., Dr S. Kiran, Dr A. Ranichitra, and Dr A. Rajesh Kanna. "Improved Data Encryption Standard Algorithm using Zigzag Scan for Secured Data Transmission." International Journal of Innovative Technology and Exploring Engineering 12, no. 6 (May 30, 2023): 26–37. http://dx.doi.org/10.35940/ijitee.f9516.0512623.
Повний текст джерелаJenifa Sabeena, S., and S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (March 10, 2023): 154–62. http://dx.doi.org/10.17762/ijritcc.v11i2.6140.
Повний текст джерелаSabeena, S. Jenifa, and S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 12 (December 31, 2022): 12–20. http://dx.doi.org/10.17762/ijritcc.v10i12.5836.
Повний текст джерелаSeptien-Hernandez, Jose-Antonio, Magali Arellano-Vazquez, Marco Antonio Contreras-Cruz, and Juan-Pablo Ramirez-Paredes. "A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications." Sensors 22, no. 2 (January 9, 2022): 489. http://dx.doi.org/10.3390/s22020489.
Повний текст джерелаДисертації з теми "Standard Cryptosystems"
Houzelot, Agathe. "Analyse pratique de standards symétriques et asymétriques dans le contexte de la boîte blanche." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0217.
Повний текст джерелаWhite-box cryptography aims to secure implementations of cryptographic algorithms in hostile environments where the adversary may potentially gain full access to the implementation and its execution environment. Against this nearly omnipotent attacker, all solutions proposed to date in the literature for standard cryptosystems are considered vulnerable. However, in practice, the adversary may encounter obstacles that complicate the application of theoretically effective attacks, such as a limit on the number of executions with a given key or obfuscation layers forcing him to undertake a costly reverse-engineering phase. Therefore, the white-box model seems to define an attacker who is excessively powerful for several use-cases. In this context, companies develop proprietary solutions whose designs remain secret and are specifically tailored to their needs. It is thus crucial to study the attacks and countermeasures that can be practically applied to these implementations. In this thesis, we focus on two widely used standard cryptosystems in both symmetric and asymmetric cryptography, namely AES and ECDSA. While the literature on AES is abundant, very few publications address white-box implementations of ECDSA, despite their high relevance for the industry. For both cryptosystems, we present real-life attacks, focusing on features such as the possibility of automation, a reduced number of white-box executions and no requirement for chosen inputs. Specifically, we examine the various potential vulnerabilities of ECDSA white-boxes and show that most of them stem from the lack of reliable sources of randomness in the white-box context. We detail the attacks that we carried out to break the 97 candidate implementations of the 2021 WhibOx contest. We also demonstrate how fault injections can break the very first white-box implementation of ECDSA published in 2020 by Zhou et al., and we propose a countermeasure that does not increase the size of the code. Given that there is no other public ECDSA implementation, we also review various patents to gain insights into countermeasures used in practice in products. Regarding AES white-boxes, we propose a new and highly efficient attack that requires very few executions on random plaintexts. We also investigate the protection provided by internal encodings against side-channel attacks. This common countermeasure is used on table-based implementations and consists in applying random permutations on sensitive variables to obfuscate them. Although it is widely known that random encodings are broken with high probability, the question of whether a particular class of encodings could prevent side-channel attacks remained open. In this thesis, we answer it negatively and show that carefully crafting encodings with a specific property is not a viable solution
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Повний текст джерелаКниги з теми "Standard Cryptosystems"
Bos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Повний текст джерелаЧастини книг з теми "Standard Cryptosystems"
Biham, Eli, and Adi Shamir. "Differential Cryptanalysis of Other Cryptosystems." In Differential Cryptanalysis of the Data Encryption Standard, 109–31. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6_7.
Повний текст джерелаDevevey, Julien, Benoît Libert, Khoa Nguyen, Thomas Peters, and Moti Yung. "Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings." In Public-Key Cryptography – PKC 2021, 659–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75245-3_24.
Повний текст джерелаGalimberti, Andrea. "FPGA-Based Design and Implementation of a Code-Based Post-quantum KEM." In Special Topics in Information Technology, 27–40. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-51500-2_3.
Повний текст джерелаCachin, Christian. "Multi-Party Threshold Cryptography." In Trends in Data Protection and Encryption Technologies, 65–69. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_13.
Повний текст джерелаAli, Syed Taqi. "Provable Security for Public Key Cryptosystems." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, 317–41. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0105-3.ch014.
Повний текст джерелаAli, Syed Taqi. "Provable Security for Public Key Cryptosystems." In Cryptography, 214–38. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1763-5.ch013.
Повний текст джерелаBertoni, Guido, Jorge Guajardo, and Christof Paar. "Architectures for Advanced Cryptographic Systems." In Information Security Policies and Actions in Modern Integrated Systems, 1–63. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-186-5.ch001.
Повний текст джерелаBertoni, Guido, Jorge Guajardo, and Christof Paar. "Architectures for Advanced Cryptographic Systems." In Information Security and Ethics, 771–817. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch056.
Повний текст джерелаHafsa, Amal, Jihene Malek, and Mohsen Machhout. "Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity." In Lightweight Cryptographic Techniques and Cybersecurity Approaches [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.105207.
Повний текст джерелаSihare, Shyam R. "The Potential of Quantum Cryptography in Securing Future Communication Channels." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 127–79. IGI Global, 2024. http://dx.doi.org/10.4018/978-1-7998-9522-0.ch005.
Повний текст джерелаТези доповідей конференцій з теми "Standard Cryptosystems"
Guimarães, Antonio, Diego F. Aranha, and Edson Borin. "Secure and efficient software implementation of QC-MDPC code-based cryptography." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19272.
Повний текст джерелаM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Повний текст джерелаYongnan Li, Limin Xiao, Zifeng Wang, and Hongyun Tian. "High Performance Point-Multiplication for Conic Curves Cryptosystem Based on Standard NAF Algorithm and Chinese Remainder Theorem." In 2011 International Conference on Information Science and Applications (ICISA 2011). IEEE, 2011. http://dx.doi.org/10.1109/icisa.2011.5772434.
Повний текст джерелаHombrebueno, Don Jomar S., Ma Gracia Corazon E. Sicat, Jasmin D. Niguidula, Enrico P. Chavez, and Alexander A. Hernandez. "Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-cast Messenger Application." In 2009 Second International Conference on Computer and Electrical Engineering. IEEE, 2009. http://dx.doi.org/10.1109/iccee.2009.249.
Повний текст джерелаЗвіти організацій з теми "Standard Cryptosystems"
Boyen, X., and L. Martin. Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems. RFC Editor, December 2007. http://dx.doi.org/10.17487/rfc5091.
Повний текст джерела