-
41
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
Published 2023-04-01“…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
Get full text
Article -
42
Locality preserving binary face representations using auto‐encoders
Published 2022-09-01“…Abstract Crypto‐biometric schemes, such as fuzzy commitment, require binary sources. …”
Get full text
Article -
43
The JPEX scandal: a test case for Hong Kong’s new cryptocurrency regulatory regime or is it still the wild west?
Published 2025-02-01“…The paper concludes with recommendations for enhancing regulatory clarity and ensuring the sustainable growth of Hong Kong as a global crypto hub.…”
Get full text
Article -
44
Prospects for the creation of national and supranational cryptocurrencies in the BRICS countries
Published 2019-06-01“…The article proposes to carry out the process of developing a new financial system of the BRICS States in the following sequence: to transfer foreign trade between the States to settlements in national currencies, with the subsequent development of its own unit of account, which will subsequently be able to replace the dollar and the Euro in mutual settlements within the BRICS; develop your own cryptocurrency or choose one of the existing cryptocurrencies, which for a certain period will be one of the possible elements of the settlement mechanism in the mutual trade of these five countries; to develop supra-national crypto-currency for the countries members of the BRICS. …”
Get full text
Article -
45
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…Then, the puzzling is a unit of Information Fusion and Inverse Information Fusion, while the crypto agility component is a frontier component based on Quantum Computing, which gives a stochastic dynamic to the information and, in particular, to its data fragments. …”
Get full text
Article -
46
Machine Learning in Money Laundering Detection Over Blockchain Technology
Published 2025-01-01“…This paper introduces a novel machine learning-based approach called Value-driven-Transactional tracking Analytics for Crypto compliance (VTAC) for the detection of illegal crypto transactions via Blockchain. …”
Get full text
Article -
47
Key-controlled Rijndael algorithm with multiple S-boxes
Published 2007-01-01“…According to the design criterion of S-box in Rijndael algorithm,a number of S-boxes with good crypto-graphic properties were constructed,and the avalanche probabilities of these S-boxes were analyzed from variance point of view.Based on these studies,a key-controlled Rijndael algorithm with multiple S-boxes was proposed with the im-provement of SubBytes algorithm in Rijndael.Experimental results show that the improved algorithm has stronger ability to resist differential attack,and the avalanche effect of the algorithm is more reasonable.…”
Get full text
Article -
48
Short signature based on factoring problem in the standard model
Published 2011-01-01“…A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in this scheme was compromised of one element in,and the public key was short,requir-ing only the modulus N,one element of,one integer and one pseudorandom function seed.Compared with Hohen-berger’s RSA scheme(Crypto 09),the computaional cost of the sign algorithm and verification algorithm in this scheme is also much lower.…”
Get full text
Article -
49
CRYPTOCURRENCY AS NEW ECONOMIC AND LEGAL PHENOMENON
Published 2018-02-01“…It is proved that the establishment of effective regulation of the crypto currency is impossible without an understanding of its economic nature. …”
Get full text
Article -
50
Lossless sharing visual cryptography
Published 2013-03-01“…According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. …”
Get full text
Article -
51
Certificate integration management platform based on identity key
Published 2016-10-01“…Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system communication and storage cost.A management platform and its unique merits were introduced after analyzing the current security schemes and comparing their various advantages and defects.According to the analysis of technical principles and functions,this product has a promising future.…”
Get full text
Article -
52
LEGAL APPROACHES FOR THE REGULATION OF CRYPTOCURRENCY AND ICO IN FOREIGN COUNTRIES AND THE EUROPEAN UNION
Published 2018-04-01“…The emerging approaches to the legal regulation of ICO and crypto currency in foreign countries and the European Union (EU) are analysed. …”
Get full text
Article -
53
DIGITALIZATION OF CRYPTOSPHERE OF THE EAEU COUNTRIES: STATUS AND PROSPECTS
Published 2019-06-01“…Conclusions and recommendations have been formulated: 1.it is necessary to develop a single regulatory framework for the regulation of the crypto sphere in the EAEU countries. 2.digitalization of the cryptosphere should be carried out according to the General scheme; 3.to make maximum use of blockchain technology to create a digital economy in the EAEU countries.…”
Get full text
Article -
54
L’Étrange cas de Coleman Silk, le Jewbird de The Human Stain de Philip Roth
Published 2009-02-01“…He is a true tragic hero in a crypto-mythical environment and has a lot in common with Malamud’s Jewbird, which seems to have made its way into a cage at the local Audubon Society. …”
Get full text
Article -
55
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01“…Both of the schemes have more expressive functionalities than identity-based matchmaking encryption (IB-ME) scheme, and are simpler than Ateniese et al.’s modular ME scheme (Crypto’ 19). But our schemes only achieve a very limited flavor of security, which is reflected in the privacy.…”
Get full text
Article -
56
L’alternative monétaire Bitcoin : une perspective institutionnaliste
Published 2015-12-01“…The first and most popular of them, the Bitcoin, was launched after the financial crisis of 2008 and disputes a credit-based monetary order supported by banks. In general, crypto-currencies are challenging the traditional design of the currency as a unitary, territorialized and centralized system. …”
Get full text
Article -
57
Le numérique au secours des monnaies locales et complémentaires
Published 2018-12-01“…Local and complementary Currencies as well as crypto currencies appear after the 2008 crisis and are built on a critique of the dominant financial system. …”
Get full text
Article -
58
Impossible statistical fault analysis of the PRIDE lightweight cryptosystem
Published 2024-01-01“…To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers were designed, such as the Chi-square goodness-of-fit test-Hamming weight, and Chi-square goodness-of-fit test-maximum likelihood estimation.The proposed method had a random nibble-oriented fault model, and combined the statistical distribution states with the impossible relationship.On the difference among the intermediate states before and after the fault injections, at least 432 faults were required to recover the 128 bit secret key of PRIDE with a reliability of at least 99%.The experimental analysis demonstrates that the proposed method can not only reduce injected faults and latency, but also increase the accuracy.The results provide a vital reference for exploring the implementation security of lightweight cryptosystems.…”
Get full text
Article -
59
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01“…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
Get full text
Article -
60
Algebraic fault attack on PRESENT
Published 2012-08-01“…A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis method; secondly got information of fault cryptograph by fault attack technique,and transformed differential of fault and cryptograph into additional algebraic equations; finally utilized Crypto Mini SAT solver to solve the equations and recover key.Experiments demonstrate that after injecting 4-bit fault to the 29<sup>th</sup> round of PRESENT-80,the fault location and fault value are unknown,only 2 injectings can recover 64-bit last whitening key in 50 seconds that reduce master key of PRESENT-80 searching space to 2<sup>16</sup>,then recover the master key after 1 minute brute-force-search on average; compared with previous fault attack on PRESENT,the amount of this attack sample is the smallest;meanwhile,the analysis method proposed can be applied into the algebraic fault attack of other block ciphers.…”
Get full text
Article