Search Results

Learning to Protect Communications with Adversarial Neural Cryptography

9 code implementations21 Oct 2016

We ask whether neural networks can learn to use secret keys to protect information from other neural networks.

Use of Cryptography in Malware Obfuscation

1 code implementation7 Dec 2022

Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection.

Cryptography and Security

Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards

1 code implementation2 Dec 2019

Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round.

Cryptography and Security Performance

Bridging machine learning and cryptography in defence against adversarial attacks

3 code implementations5 Sep 2018

The majority of the proposed existing adversarial attacks are based on the differentiability of the DNN cost function. Defence strategies are mostly based on machine learning and signal processing principles that either try to detect-reject or filter out the adversarial perturbations and completely neglect the classical cryptographic component in the defence.

BIG-bench Machine Learning

VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture

1 code implementation IEEE Transactions on Circuits and Systems I: Regular Papers 2020

In the 5G era, massive devices need to be securely connected to the edge of communication networks, while emerging quantum computers can easily crack the traditional public-key ciphers.

Hardware Architecture

Product Subset Problem : Applications to number theory and cryptography

1 code implementation10 Feb 2020

We consider applications of Subset Product Problem (SPP) in number theory and cryptography.

Number Theory Discrete Mathematics 11Y16, 11A51, 11T71, 94A60, 68R05

A Monogamy-of-Entanglement Game With Applications to Device-Independent Quantum Cryptography

2 code implementations16 Oct 2012

We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system.

Quantum Physics

A Hands-On Quantum Cryptography Workshop For Pre-University Students

1 code implementation6 Nov 2019

We developed a modified version of a conventional (BB84) quantum key distribution protocol that can be understood and implemented by students at a pre-university level.

Physics Education Quantum Physics

The Impact of Quantum Computing on Present Cryptography

1 code implementation31 Mar 2018

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.

Cryptography and Security

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

2 code implementations31 May 2019

As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance.

Cryptography and Security