Search

Your search keyword '"nist"' showing total 11,667 results

Search Constraints

Start Over You searched for: Descriptor "nist" Remove constraint Descriptor: "nist"
11,667 results on '"nist"'

Search Results

1. Cutting-Edge Amalgamation of Web 3.0 and Hybrid Chaotic Blockchain Authentication for Healthcare 4.0.

2. ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool.

3. Crypto-Coding Scheme via Dynamic Interleaver for New Communication Standards.

4. ДВОРІВНЕВА КОНЦЕПЦІЯ ДЛЯ МОДЕЛЮВАННЯ ЄДИНОЇ ЗАВАДОСТІЙКОЇ ПЕРЕДАЧІ ЦИФРОВИХ ДАНИХ

5. Reconfigurable Image Confusion Scheme Using Large Period Pseudorandom Bit Generator Based on Coupled-Variable Input LCG and Clock Divider.

6. Preimage attacks on reduced-round Ascon-Xof.

7. Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures.

8. Blockchain-Inspired Lightweight Dynamic Encryption Schemes for a Secure Health Care Information Exchange System.

9. Behind the Code: Identifying Zero-Day Exploits in WordPress.

10. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

11. Various pseudo random number generators based on memristive chaos map model.

12. IMPROVING PROTECTION OF FALCON ELECTRONIC SIGNATURE SOFTWARE IMPLEMENTATIONS AGAINST ATTACKS BASED ON FLOATING POINT NOISE.

13. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

14. Differential fault attack on SPN-based sponge and SIV-like AE schemes.

15. Quantum random number generator on IBM QX.

16. Hybrid Information Security Framework Based on ISO/IEC 27005:2022 and the NIST Framework for the Ministry of Education of Ecuador (TIC)

17. Deep Learning-Based Differential Distinguishers for NIST Standard Authenticated Encryption and Permutations

18. A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness

22. An Approach to Measure the Effectiveness of the MITRE ATLAS Framework in Safeguarding Machine Learning Systems Against Data Poisoning Attack

23. CCAF, Continuous Cyber Assurance Framework

24. Comparative Analysis of Bit Flipping Decoders in BIKE PQC

25. Build Your Security Program for GenAI

26. A Modest Approach Toward Cloud Security Hygiene

27. ISO/IEC 27001 Standard: Analytical and Comparative Overview

28. E-Learning Paradigm in Cloud Computing and Pertinent Challenges in Models Used for Cloud Deployment

31. Design of a New Neuro-Generator with a Neuronal Module to Produce Pseudorandom and Perfectly Pseudorandom Sequences.

32. A novel TT-SHO QoS aware and secured Vehicular Adhoc Network (VANET) routing protocol for smart intelligent transportation.

33. TinyJAMBU Hardware Implementation for Low Power

34. A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid

35. Cutting-Edge Amalgamation of Web 3.0 and Hybrid Chaotic Blockchain Authentication for Healthcare 4.0

37. Improving the performance of authentication protocols using efficient modular multi exponential technique.

38. Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.

39. RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY.

40. NIST CSF 2.0: НОВИЙ ФРЕЙМВОРК З КІБЕРБЕЗПЕКИ ВІД НАЦІОНАЛЬНОГО ІНСТИТУТУ СТАНДАРТІВ І ТЕХНОЛОГІЙ США.

41. Critical Analysis of Beta Random Variable Generation Methods.

42. NIST Test Validation for Lorenz Chaotic Random Generator CRN.

43. Implementation Framework National Institute of Standards and Technology (Nist) Evidence Digital In The Forensic Process Social Media.

44. Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing

45. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions

46. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

47. A Design of Highly-Secured Map Chaotic Encryption Scheme for VANET Communication

48. Blind Side Channel Analysis on the Elephant LFSR Extended Version

Catalog

Books, media, physical & digital resources