Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z.

H Rrghout, M Kattass, Y Qobbi… - … Journal of Electrical …, 2024 - search.ebscohost.com
Currently, digital communication generates a considerable amount of data from digital
images. Preserving the confidentiality of these images during transmission through network …

The Built on Feistel Network Architecture Block Ciphers Modification

S Naumenko, I Rozlomii… - 2024 14th International …, 2024 - ieeexplore.ieee.org
The article considers the method of implementing Shannon's idea of building a
cryptographically stable system by repeatedly applying relatively simple cryptographic …

Increasing the cryptographic strength of CETencryption by ensuring the transformation quality of the information block

V Rudnytskyi, N Lada, M Pochebut… - 2023 13th …, 2023 - ieeexplore.ieee.org
The article is devoted to the study of the cryptographic algorithms' correctness, symmetry
and quality, as well as to the analysis of ways to increase the cryptographic strength of low …

[PDF][PDF] Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application

O Kuznetsov, Y Kuznetsova, E Frontoni, M Arnesano… - 2024 - ceur-ws.org
This study presents a comprehensive performance analysis of symmetric encryption
algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set …

Mathematical Insights into Cryptographic Algorithms: Recent Analysis and Future Directions

KD Sharma, H Saini, S Johari - 2024 IEEE North Karnataka …, 2024 - ieeexplore.ieee.org
Particularly, in the last two decades, digital technologies have rapidly grown in a walk of life
such as education, finance, information technology, e-vehicles, smart-homes, health care …

Secure data communication in IoT-based medical health systems using Frobenius rings

V Azizi Nasrabadi, H Haj Seyyed Javadi… - … Journal of Nonlinear …, 2024 - ijnaa.semnan.ac.ir
In this paper, we propose using Frobenius rings to increase the security of data
communication in medical health systems based on the Internet of Things. Frobenius rings …

Simplified RSA Encryption Module for FPGA: A Comparative Analysis Between Kintex and Genesys Boards

G Singh, A Kaur - … on Intelligent Cyber Physical Systems and …, 2024 - ieeexplore.ieee.org
This Verilog module encapsulates simplified RSA encryption in an FPGA design. With a
default key length of 1024 bits, the module has clock, reset, and start signals to start …

Incidencia de la computación cuántica en los algoritmos criptográficos

EO Bernardi-Espín… - Código …, 2024 - revistacodigocientifico.itslosandes …
La computación cuántica representa una innovadora frontera tecnológica con el potencial
de revolucionar diversas áreas incluyendo la criptografía, que es esencial para garantizar la …

Research on Physical Layer Key Generation and Agreement Technology Based on Wireless Channels

J Qian, J Luo, H Lv, C Chen… - 2024 4th International …, 2024 - ieeexplore.ieee.org
With the rapid development of wireless networks, the application of wireless devices in the
field of communication is be-coming increasingly widespread. However, the openness of …