Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification
Encrypted traffic classification requires discriminative and robust traffic representation
captured from content-invisible and imbalanced traffic data for accurate classification, which …
captured from content-invisible and imbalanced traffic data for accurate classification, which …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
Multi-level of DNA encryption technique based on DNA arithmetic and biological operations
Networks have evolved very rapidly, which allow secret data transformation speedily
through the Internet. However, the security of secret data has posed a serious threat due to …
through the Internet. However, the security of secret data has posed a serious threat due to …
Security analysis of blowfish algorithm
A Alabaichi, F Ahmad… - 2013 Second International …, 2013 - ieeexplore.ieee.org
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …
Hash‐One: a lightweight cryptographic hash function
P Megha Mukundan, S Manayankath… - IET Information …, 2016 - Wiley Online Library
The increased demand for lightweight applications has triggered the need for appropriate
security mechanisms in them. Lightweight cryptographic hash functions are among the …
security mechanisms in them. Lightweight cryptographic hash functions are among the …
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
Exploiting diversity in android tls implementations for mobile app traffic classification
Network traffic classification is an important tool for network administrators in enabling
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …
Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA
This paper introduces a security analysis scheme for the most famous secure hash
algorithms SHA-1 and SHA-2. Both algorithms follow Merkle Damgård structure to compute …
algorithms SHA-1 and SHA-2. Both algorithms follow Merkle Damgård structure to compute …
DNA based random key generation and management for OTP encryption
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method
which offers total privacy. The OTP encryption scheme has proved to be unbreakable in …
which offers total privacy. The OTP encryption scheme has proved to be unbreakable in …
Advanced encryption standard based on key dependent S‐Box cube
A Seghier, J Li, DZ Sun - IET Information Security, 2019 - Wiley Online Library
The advanced encryption standard (AES) is the most encryption algorithm used around the
world. This fact made it coveted by several cryptanalysis attacks. Some of them succeed to …
world. This fact made it coveted by several cryptanalysis attacks. Some of them succeed to …