Medical image encryption: a comprehensive review
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
On Multiple Encryption for Public-Key Cryptography
T Soroceanu, N Buchmann, M Margraf - Cryptography, 2023 - mdpi.com
Using multiple, individual encryption schemes is a well-established method to increase the
overall security of encrypted data. These so-called multiple encryption or hybrid schemes …
overall security of encrypted data. These so-called multiple encryption or hybrid schemes …
Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments
P Kampanakis, T Lepoint - International Conference on Research in …, 2023 - Springer
Cryptographic algorithms are vital components ensuring the privacy and security of
computer systems. They have constantly improved and evolved over the years following …
computer systems. They have constantly improved and evolved over the years following …
Time-optimal design of finite field arithmetic for sike on cortex-m4
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
The pre-shared key modes of HPKE
Abstract The Hybrid Public Key Encryption (HPKE) standard was recently published as RFC
9180 by the Crypto Forum Research Group (CFRG) of the Internet Research Task Force …
9180 by the Crypto Forum Research Group (CFRG) of the Internet Research Task Force …
[PDF][PDF] Practical challenges with AES-GCM and the need for a new cipher
P Kampanakis, M Campagna, E Crocket… - The Third NIST …, 2023 - csrc.nist.gov
AWS is pleased to see the Third NIST Workshop on Block Cipher Modes of Operation 2023
which plans to address limitations of block cipher modes (SP 800-38 series). We also …
which plans to address limitations of block cipher modes (SP 800-38 series). We also …
Post Quantum KEM authentication in SPDM for secure session establishment
The Secure Protocol and Data Model (SPDM) is a protocol that can be used to authenticate
a hardware identity and to establish secure communication sessions between devices. A …
a hardware identity and to establish secure communication sessions between devices. A …
On the Security of Rate-limited Privacy Pass
H Chu, K Do, L Hanzlik - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The privacy pass protocol allows users to redeem anonymously issued cryptographic tokens
instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the …
instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the …
Quantum Resistant Blockchain-based Architecture for Secure Medical Data Sharing
K Jain, M Singh, H Gupta, A Bhat - 2024 3rd International …, 2024 - ieeexplore.ieee.org
The development of quantum computing substantially threatens modern cryptographic
functions in blockchains, making it unsafe to share sensitive details such as Electronic …
functions in blockchains, making it unsafe to share sensitive details such as Electronic …
Fully Hybrid TLSv1. 3 in WolfSSL on Cortex-M4
To provide safe communication across an unprotected medium such as the internet, network
protocols are being established. These protocols employ public key techniques to perform …
protocols are being established. These protocols employ public key techniques to perform …