supported by National Natural Science Foundation of China(Grant Nos.62122092,62032005)。
The SM9 identity-based encryption(IBE)scheme is a cryptographic standard used in China,and has been incorporated into the ISO/IEC standard in 2021.This work primarily proposes a countermeasure to secure the SM9 IBE sc...
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
supported by China’s National Natural Science Foundation(Nos.62072249,62072056);This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...
supported by the Beijing Natural Science Foundation(Grant No.4222016).
In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memo...
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...
The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4320020DSR01).
This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography(ECC)and PRESENT for cryptographic applications.The features of the proposed work are(i)computation of only the point multiplic...
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization algorithms.These classifiers,on the other hand,do not work e...
supported by the Beijing Natural Science Foundation(4232034);the Fundamental Research Funds for the Central Universities(328202222);the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...
This work is supported by the Fundamental Research Funds for the central Universities(Zhejiang University NGICS Platform),Xiaofeng Yu receives the grant and the URLs to sponsors’websites are https://www.zju.edu.cn/.And the work are supported by China’s National Natural Science Foundation(No.62072249,62072056);JinWang and Yongjun Ren receive the grant and the URLs to sponsors’websites are https://www.nsfc.gov.cn/.This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029);Jin Wang receives the grant and the URLs to sponsors’websites are http://kjt.hunan.gov.cn/.
With the rapid development of information technology,the development of blockchain technology has also been deeply impacted.When performing block verification in the blockchain network,if all transactions are verified...