Articles tagged with: #cryptography Clear filter
An 8- and 12-bit block AES cipher

An 8- and 12-bit block AES cipher

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.18485v1 Announce Type: new Abstract: Because it is so unusual, or hard to find, or expository, a truly tiny 8- or 12-bit block AES (Rijndael) cipher is documented here, along with Java source code.

Post-Quantum Blockchain: Challenges and Opportunities

Post-Quantum Blockchain: Challenges and Opportunities

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.17071v1 Announce Type: new Abstract: Blockchain is a Distributed Ledger Technology (DLT) that offers numerous benefits including decentralization, transparency, efficiency, and reduced costs. Hence, blockchain has been included in many fields. Blockchain relies on cryptographic protocols (especially public-key cryptography and hash functions) to achieve many essential sub-routines. However, the increased progress of quantum computation and algorithms has threatened the security of...

NIST Publish 'Lightweight Cryptography' Standard To Protect IoT Devices

NIST Publish 'Lightweight Cryptography' Standard To Protect IoT Devices

Cyber Security News cybersecuritynews.com

The National Institute of Standards and Technology (NIST) has officially released NIST Special Publication 800-232, establishing the Ascon family of algorithms as the new standard for lightweight cryptography designed specifically for resource-constrained devices. Published in August 2025, this groundbreaking standard addresses critical security gaps in Internet of Things (IoT) devices, embedded systems, and low-power sensors

A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries

A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.16078v1 Announce Type: new Abstract: The rapid advancement of quantum computing poses a significant threat to modern cryptographic systems, necessitating the transition to Post-Quantum Cryptography (PQC). This study evaluates the support for PQC algorithms within nine widely used open-source cryptographic libraries -- OpenSSL, wolfSSL, BoringSSL, LibreSSL, Bouncy Castle, libsodium, Crypto++, Botan, and MbedTLS -- focusing on their implementation of the NIST-selected PQC finalists:...

Evolving k-Threshold Visual Cryptography Schemes

Evolving k-Threshold Visual Cryptography Schemes

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.15917v1 Announce Type: new Abstract: In evolving access structures, the number of participants is countably infinite with no predetermined upper bound. While such structures have been realized in secret sharing, research in secret image sharing has primarily focused on visual cryptography schemes (VCS). However, there exists no construction for $(k,\infty)$ VCS that applies to arbitrary $k$ values without pixel expansion currently, and the contrast requires enhancement. In this...

Optimizing Scalar Selection in Elliptic Curve Cryptography Using Differential Evolution for Enhanced Security

Optimizing Scalar Selection in Elliptic Curve Cryptography Using Differential Evolution for Enhanced Security

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.13520v1 Announce Type: new Abstract: Elliptic Curve Cryptography (ECC) is a fundamental component of modern public-key cryptosystems that enable efficient and secure digital signatures, key exchanges, and encryption. Its core operation, scalar multiplication, denoted as $k \cdot P$, where $P$ is a base point and $k$ is a private scalar, relies heavily on the secrecy and unpredictability of $k$. Conventionally, $k$ is selected using user input or pseudorandom number generators....

QuSecure Taps Jennifer Leggio as SVP of Marketing & Revenue

QuSecure Taps Jennifer Leggio as SVP of Marketing & Revenue

Cyber Security - AI-Tech Park ai-techpark.com

Award-winning cybersecurity leader to help drive market share and mindshare at a pivotal time for crypto-agility and quantum-readiness QuSecure(TM), Inc., a leader in post-quantum cryptography (PQC) and cryptographic agility, today announced the appointment of Jennifer Leggio as Senior Vice President of Marketing and Revenue Operations as demand for QuSecure's platform quadruples....

QuSecure Names Jennifer Leggio SVP of Marketing and Revenue Operations

QuSecure Names Jennifer Leggio SVP of Marketing and Revenue Operations

Cyber Security - AI-Tech Park ai-techpark.com

Award-winning Cybersecurity Leader to Help Drive Market Share and Mindshare at Pivotal Time for Crypto-agility and Quantum-readiness QuSecure(TM), Inc., a leader in post-quantum cryptography (PQC) and cryptographic agility, today announced the appointment of Jennifer Leggio as Senior Vice President of Marketing and Revenue Operations as demand for QuSecure's platform quadruples. A widely...