A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues
SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which
emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 …
emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 …
Post-quantum key {Exchange—A} new hope
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
[图书][B] Report on post-quantum cryptography
In recent years, there has been a substantial amount of research on quantum computers–
machines that exploit quantum mechanical phenomena to solve mathematical problems that …
machines that exploit quantum mechanical phenomena to solve mathematical problems that …
Information security: A review of information security issues and techniques
F Alkhudhayr, S Alfarraj, B Aljameeli… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Currently, corporations are more into using distributed systems and relying on networks and
communication facilities for transmitting critical and important information that needs to be …
communication facilities for transmitting critical and important information that needs to be …
A search engine backed by Internet-wide scanning
Fast Internet-wide scanning has opened new avenues for security research, ranging from
uncovering widespread vulnerabilities in random number generators to tracking the evolving …
uncovering widespread vulnerabilities in random number generators to tracking the evolving …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …
surface, the insecurities of IoT devices seem to be caused by integration problems that may …
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
A comprehensive symbolic analysis of TLS 1.3
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …
Verified models and reference implementations for the TLS 1.3 standard candidate
K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …
design is a reaction both to the increasing demand for low-latency HTTPS connections and …