Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

On Multiple Encryption for Public-Key Cryptography

T Soroceanu, N Buchmann, M Margraf - Cryptography, 2023 - mdpi.com
Using multiple, individual encryption schemes is a well-established method to increase the
overall security of encrypted data. These so-called multiple encryption or hybrid schemes …

Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments

P Kampanakis, T Lepoint - International Conference on Research in …, 2023 - Springer
Cryptographic algorithms are vital components ensuring the privacy and security of
computer systems. They have constantly improved and evolved over the years following …

Time-optimal design of finite field arithmetic for sike on cortex-m4

M Anastasova, R Azarderakhsh… - … Conference on Information …, 2022 - Springer
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …

The pre-shared key modes of HPKE

J Alwen, J Janneck, E Kiltz, B Lipp - … on the Theory and Application of …, 2023 - Springer
Abstract The Hybrid Public Key Encryption (HPKE) standard was recently published as RFC
9180 by the Crypto Forum Research Group (CFRG) of the Internet Research Task Force …

[PDF][PDF] Practical challenges with AES-GCM and the need for a new cipher

P Kampanakis, M Campagna, E Crocket… - The Third NIST …, 2023 - csrc.nist.gov
AWS is pleased to see the Third NIST Workshop on Block Cipher Modes of Operation 2023
which plans to address limitations of block cipher modes (SP 800-38 series). We also …

Post Quantum KEM authentication in SPDM for secure session establishment

J Yao, A Hlayhel, K Matusiewicz - IEEE Design & Test, 2023 - ieeexplore.ieee.org
The Secure Protocol and Data Model (SPDM) is a protocol that can be used to authenticate
a hardware identity and to establish secure communication sessions between devices. A …

On the Security of Rate-limited Privacy Pass

H Chu, K Do, L Hanzlik - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The privacy pass protocol allows users to redeem anonymously issued cryptographic tokens
instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the …

Quantum Resistant Blockchain-based Architecture for Secure Medical Data Sharing

K Jain, M Singh, H Gupta, A Bhat - 2024 3rd International …, 2024 - ieeexplore.ieee.org
The development of quantum computing substantially threatens modern cryptographic
functions in blockchains, making it unsafe to share sensitive details such as Electronic …

Fully Hybrid TLSv1. 3 in WolfSSL on Cortex-M4

M Anastasova, R Azarderakhsh… - … Conference on Applied …, 2024 - Springer
To provide safe communication across an unprotected medium such as the internet, network
protocols are being established. These protocols employ public key techniques to perform …