[HTML][HTML] Rcryptect: Real-time detection of cryptographic function in the user-space filesystem

S Lee, N Jho, D Chung, Y Kang, M Kim - Computers & Security, 2022 - Elsevier
The existing methods of ransomware detection have limitations. To be specific, static
analysis is not effective to obfuscated binaries, while dynamic analysis is usually restricted to …

A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic

M Luis, L Daniel, A Isabel, A Deicy - Multimedia Tools and Applications, 2023 - Springer
Based on the combination of quaternion numbers, residual matrices, and chaotic attractors,
a new cryptosystem is proposed for multimedia processing files such as images and audio …

[PDF][PDF] A hybrid modified lightweight algorithm for achieving data integrity and confidentiality

LA Muhalhal, IS Alshawi - International Journal of Electrical and …, 2023 - academia.edu
Encryption algorithms aim to make data secure enough to be decrypted by an attacker. This
paper combines the Speck and the Salsa20 to make it difficult for an attacker to exploit any …

[PDF][PDF] Modified round function of SIMECK 32/64 block cipher

PC Encarnacion, BD Gerardo… - Int. J. Adv. Trends …, 2020 - academia.edu
ABSTRACT Lightweight Block Cipher's (LBC) various algorithms need to meet the security
requirements for all resource-constrained devices and Internet of Things (IoT) technologies …

A hidden OSTBC scheme to enhance physical layer security by employing a pseudorandom precoder

N Sanandaji, A Falahati - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The capability of exploiting Orthogonal Space-Time Block Codes (OSTBC) for increasing
physical layer security of wireless systems is studied. A technique named “hidden OSTBC” is …

[PDF][PDF] Studies on the Computational Model of PRNG for Data Privacy Risk Mitigation in 5G Networks

S Gnatyuk, D Ospanova, V Lytvynenko… - CEUR Workshop …, 2021 - ceur-ws.org
Today, pseudo-random number generators (PRNGs) are used in various systems and
applications, including as key generators in stream ciphers, blockchain, game industry and …

Proving the Randomness of a Quantum Random Number Generator

BF Nuka - 2023 - search.proquest.com
Random number generators have been an important component of classical cryptography
for years. However, the classical cryptography systems that have been based on …

Sistema para encriptación de archivos multimedia a partir de atractores caóticos y teoría de cuaterniones

LE Méndez López, DE Ladino Torres - repository.udistrital.edu.co
In this research work we propose an encryption system for the processing of multimedia files
based on the numerical set of quaternion numbers and chaotic attractors, in order to simplify …