-
1
Cryptographic Censorship
Published 2025-01-01“…Abstract We formulate and take two large strides towards proving a quantum version of the weak cosmic censorship conjecture. We first prove “Cryptographic Censorship”: a theorem showing that when the time evolution operator of a holographic CFT is approximately pseudorandom (or Haar random) on some code subspace, then there must be an event horizon in the corresponding bulk dual. …”
Get full text
Article -
2
INFORMATIVE DESCRIPTORS FOR STATISTICAL RECOGNITION OF CRYPTOGRAPHIC GENERATORS
Published 2016-10-01“…An approach to developing informative descriptors for solving the problem of statistical recognition of cryptographic generators is proposed. The descriptors developed by this approach are given. …”
Get full text
Article -
3
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
Published 2020-06-01Get full text
Article -
4
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. …”
Get full text
Article -
5
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01“…Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. …”
Get full text
Article -
6
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01“…In this article, we proposed a novel technique to generate cryptographically strong S-box by using fractional transformation based on finite field. …”
Get full text
Article -
7
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
Get full text
Article -
8
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
9
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01“…At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments.…”
Get full text
Article -
10
-
11
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
Published 2024-01-01“…The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. …”
Get full text
Article -
12
-
13
-
14
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
Get full text
Article -
15
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
Published 2021-10-01Subjects: Get full text
Article -
16
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…QKD methods use quantum physics concepts to establish cryptographic keys, while quantum repeaters compensate for signal loss in fiber optic cables. …”
Get full text
Article -
17
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01Subjects: “…cryptographic protocols…”
Get full text
Article -
18
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: “…cryptographic protocols…”
Get full text
Article -
19
Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”
Published 2024-01-01“…Presents corrections to the paper, (Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”).…”
Get full text
Article -
20
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article