A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues

I Budhiraja, D Garg, N Kumar, R Sharma - Computer Communications, 2023 - Elsevier
SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which
emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 …

Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

[图书][B] Report on post-quantum cryptography

L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta… - 2016 - nvlpubs.nist.gov
In recent years, there has been a substantial amount of research on quantum computers–
machines that exploit quantum mechanical phenomena to solve mathematical problems that …

Information security: A review of information security issues and techniques

F Alkhudhayr, S Alfarraj, B Aljameeli… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Currently, corporations are more into using distributed systems and relying on networks and
communication facilities for transmitting critical and important information that needs to be …

A search engine backed by Internet-wide scanning

Z Durumeric, D Adrian, A Mirian, M Bailey… - Proceedings of the …, 2015 - dl.acm.org
Fast Internet-wide scanning has opened new avenues for security research, ranging from
uncovering widespread vulnerabilities in random number generators to tracking the evolving …

Frodo: Take off the ring! practical, quantum-secure key exchange from LWE

J Bos, C Costello, L Ducas, I Mironov… - Proceedings of the …, 2016 - dl.acm.org
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …

Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …