We ask whether neural networks can learn to use secret keys to protect information from other neural networks.
Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection.
Cryptography and Security
Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round.
Cryptography and Security Performance
The majority of the proposed existing adversarial attacks are based on the differentiability of the DNN cost function. Defence strategies are mostly based on machine learning and signal processing principles that either try to detect-reject or filter out the adversarial perturbations and completely neglect the classical cryptographic component in the defence.
In the 5G era, massive devices need to be securely connected to the edge of communication networks, while emerging quantum computers can easily crack the traditional public-key ciphers.
Hardware Architecture
We consider applications of Subset Product Problem (SPP) in number theory and cryptography.
Number Theory Discrete Mathematics 11Y16, 11A51, 11T71, 94A60, 68R05
We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system.
Quantum Physics
We developed a modified version of a conventional (BB84) quantum key distribution protocol that can be understood and implemented by students at a pre-university level.
Physics Education Quantum Physics
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Cryptography and Security
As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance.
Cryptography and Security