A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications
NTY Huan, ZA Zukarnain - IEEE Access, 2024 - ieeexplore.ieee.org
By 2025, the Internet of Things (IoT) infrastructure is projected to encompass over 75 billion
devices, facilitated by the increasing proliferation of intelligent applications. The IoT …
devices, facilitated by the increasing proliferation of intelligent applications. The IoT …
A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …
Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
E Fathalla, M Azab - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of quantum computing poses significant risks to the security of current
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …
An efficient quantum oblivious transfer protocol
Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive.
OT involves a sender having several pieces of information and a receiver having a choice …
OT involves a sender having several pieces of information and a receiver having a choice …
[HTML][HTML] Improving traceability and sustainability in the agri-food industry through blockchain technology: A bibliometric approach, benefits and challenges
The globalization of the agri-food industry in recent years has increased the difficulty and
complexity of improving productivity and addressing challenges in food security. Thus …
complexity of improving productivity and addressing challenges in food security. Thus …
Parallel Implementation of SPHINCS With GPUs
SPHINCS+ was selected as one of NIST Post-Quantum Cryptography Digital Signature
Algorithms (PQC-DSA). However, SPHINCS+ processes are slower compared to other PQC …
Algorithms (PQC-DSA). However, SPHINCS+ processes are slower compared to other PQC …
Beyond Current Cryptography: Exploring New Frontiers
P Pappachan, M Rahaman… - Innovations in Modern …, 2024 - igi-global.com
Cryptography has evolved significantly, from simple ancient ciphers to sophisticated
algorithms to secure modern digital communications. The advent of quantum computing and …
algorithms to secure modern digital communications. The advent of quantum computing and …
A constant round quantum secure protocol for oblivious polynomial evaluation
Oblivious polynomial evaluation (OPE) is a secure two-party cryptographic protocol that
enables a receiver to obliviously retrieve polynomial value on its private input for a private …
enables a receiver to obliviously retrieve polynomial value on its private input for a private …
Designing quantum-secure attribute-based encryption
In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising
encryption technique to realize fine-grained access control over encrypted data. ABE has …
encryption technique to realize fine-grained access control over encrypted data. ABE has …