Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human …
P Gupta, D Gao - 19th USENIX Security Symposium (USENIX Security …, 2010 - usenix.org
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion …
In recent years, neural networks and cryptographic schemes have come together in war and peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …
Challenging the conventional wisdom that users cannot remember cryptographically-strong secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains a challenging problem today despite two decades of intensive research in …
Y Chen, Y Shen, H Yu - The Computer Journal, 2023 - academic.oup.com
Abstract In Crypto'19, Gohr proposed the first deep learning-based key recovery attack on 11- round Speck32/64, which opens the direction of neural-aided cryptanalysis. Until now …
L Zhang, Z Wang - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In CRYPTO'19, Gohr introduced a novel cryptanalysis method by developing a differential- neural distinguisher using neural networks as the underlying distinguisher. He effectively …
PP Hadke, SG Kale - … World Conference on Futuristic Trends in …, 2016 - ieeexplore.ieee.org
In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and …
It is well-known that the protection of long-lived private keys in cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals …