Cloud environments are essential for modern computing,but are increasingly vulnerable to Side⁃Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we...
supported by National Natural Science Foundation of China(Grant Nos.62122092,62032005)。
The SM9 identity-based encryption(IBE)scheme is a cryptographic standard used in China,and has been incorporated into the ISO/IEC standard in 2021.This work primarily proposes a countermeasure to secure the SM9 IBE sc...
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
supported by China’s National Natural Science Foundation(Nos.62072249,62072056);This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...
supported by the Beijing Natural Science Foundation(Grant No.4222016).
In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memo...
The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4320020DSR01).
This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography(ECC)and PRESENT for cryptographic applications.The features of the proposed work are(i)computation of only the point multiplic...
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization algorithms.These classifiers,on the other hand,do not work e...
supported by the Beijing Natural Science Foundation(4232034);the Fundamental Research Funds for the Central Universities(328202222);the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...