A New Approach of Cryptography for Data Encryption and Decryption

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

research papers on applied cryptography

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

Applied Cryptography

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Last »
  • Mathematics of Cryptography Follow Following
  • Cryptography Follow Following
  • Secure Hardware For Cryptography Follow Following
  • Chaotic cryptography Follow Following
  • Information Security Follow Following
  • Watermarking Follow Following
  • Public Key Crypto systems Follow Following
  • Decryption Follow Following
  • Privacy Follow Following
  • Quantum Cryptography Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Help | Advanced Search

Computer Science > Cryptography and Security

Title: machine learning for windows malware detection and classification: methods, challenges and ongoing research.

Abstract: In this chapter, readers will explore how machine learning has been applied to build malware detection systems designed for the Windows operating system. This chapter starts by introducing the main components of a Machine Learning pipeline, highlighting the challenges of collecting and maintaining up-to-date datasets. Following this introduction, various state-of-the-art malware detectors are presented, encompassing both feature-based and deep learning-based detectors. Subsequent sections introduce the primary challenges encountered by machine learning-based malware detectors, including concept drift and adversarial attacks. Lastly, this chapter concludes by providing a brief overview of the ongoing research on adversarial defenses.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

research papers on applied cryptography

Journal of Cryptology

  • Provides a forum for original results in all areas of cryptology
  • Covers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectives
  • Also discusses implementation, application, and standards issues
  • In addition to full-length technical, survey, and historical articles, the journal publishes short notes
  • The official journal of the International Association for Cryptologic Research
  • Vincent Rijmen

Societies and partnerships

New Content Item

Latest articles

Watermarking prfs and pke against quantum adversaries.

  • Fuyuki Kitagawa
  • Ryo Nishimaki

research papers on applied cryptography

Cryptographic Primitives with Hinting Property

  • Navid Alamati
  • Sikhar Patranabis

research papers on applied cryptography

Analysis of Multivariate Encryption Schemes: Application to Dob and \({C}^{*}\)

  • Morten Øygarden
  • Patrick Felke
  • Håvard Raddum

research papers on applied cryptography

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

  • Qianqian Yang

research papers on applied cryptography

Bitcoin as a Transaction Ledger: A Composable Treatment

  • Christian Badertscher
  • Ueli Maurer
  • Vassilis Zikas

research papers on applied cryptography

Journal updates

Special issue guidelines, announcement of new editor-in-chief, journal information.

  • ACM Digital Library
  • Current Contents/Engineering, Computing and Technology
  • EI Compendex
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • Mathematical Reviews
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • Science Citation Index Expanded (SCIE)
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Springer policies

© International Association for Cryptologic Research

  • Find a journal
  • Publish with us
  • Track your research

IMAGES

  1. Research Paper on Cyber Security & Cryptography

    research papers on applied cryptography

  2. (PDF) A review of cryptographic algorithms in network security

    research papers on applied cryptography

  3. (PDF) Lightweight Cryptography for IoT: A State-of-the-Art

    research papers on applied cryptography

  4. (PDF) A Review Paper on Cryptography of Modified Caesar Cipher

    research papers on applied cryptography

  5. (PDF) A Review Paper on Cryptography

    research papers on applied cryptography

  6. (PDF) Review on Network Security and Cryptography

    research papers on applied cryptography

VIDEO

  1. Computing on Encryption Data: Functional Encryption and More

  2. 2. Key Challenges for implementing Security

  3. All subjects past papers # applied math # bs math 7th semester #gcuf

  4. Ciphers Fundamentals Lab

  5. The Cryptographers' Panel

  6. Cbc Initialization Vector

COMMENTS

  1. 42355 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on APPLIED CRYPTOGRAPHY. Find methods information, sources, references or conduct a literature review on ...

  2. Applied Cryptography in Network Systems Security for Cyberattack

    The paper explores applied cryptography concepts in information and network systems security to prevent cyberattacks and improve secure communications. The contribution of the paper is threefold: First, we consider the various cyberattacks on the different cryptography algorithms in symmetric, asymmetric, and hashing functions. ...

  3. Applied Cryptography, Network Security, and Privacy Protection

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Applied Cryptography, Network ...

  4. International Journal of Applied Cryptography

    IJACT provides a public forum to help cyber security academics, researchers and engineers working in the fields of cryptography and information security to disseminate state-of-the-art information and to discuss the new advances in applied cryptography. Contents. IJACT publishes original research papers. Special issues devoted to important ...

  5. Evolution of Applied Cryptography

    There exists a great divide between many government officials, security researchers and academics and the hacking community (which are more accurately defined as either white hat or cybercriminals). Whilst it is difficult to point to a research paper, the influence of Jeff Moss on cybersecurity and applied cryptography should not be understated.

  6. Applied Cryptography and Network Security

    The ACNS 2020 proceedings volume presents papers focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

  7. Applied Cryptography and Network Security

    The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions.

  8. Implementation and Performance Analysis of Hybrid ...

    Hybrid cryptography takes the advantage of integrating more than one cryptographic algorithms to enhance the overall security and performance. In our research, we have proposed a comparative study for two-tier versus three-tier hybrid cryptographic models applied to secure data on the cloud.

  9. A review on various cryptographic techniques & algorithms

    Cryptography is a tool to execute messages confidentiality. In Greek, the word "composing mystery" has a special meaning. The working cycle that changes through the actual message is called in plaintext as cypher text. The conversation loop, called scrambling, restores plaintext from the chip text [1] .

  10. Applied Sciences

    Feature papers represent the most advanced research with significant potential for high impact in the field. ... to ensure the confidentiality, integrity, and authenticity of digital data. Additionally, we examine post-quantum cryptography, a vital area of research in the face of the impending arrival of quantum computers. ... Applied Sciences ...

  11. A Review of Machine Learning and Cryptography Applications

    Adversarially robust neural cryptography deals with the training of a neural-based model using an adversary to leverage the learning process in favor of reliability and trustworthiness. The adversary can be a neural network or a strategy guided by a neural network. These mechanisms are proving successful in finding secure means of data protection. Similarly, machine learning benefits ...

  12. Cybersecurity, Cryptography, and Machine Learning

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Applied cryptography for ...

  13. Cryptography: Recent research trends of encrypting mathematics

    Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.

  14. Applied Cryptography and Network Security

    The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum ...

  15. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  16. PDF HANDBOOK of APPLIED CRYPTOGRAPHY

    reference for research professionals. Our goal was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography.

  17. Applied Cryptography and Network Security

    The ACNS 2019 proceedings volume presents papers focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

  18. Applied Cryptography Research Papers

    International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and ...

  19. Applied Cryptography and Network Security

    The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions.

  20. [2404.18541] Machine Learning for Windows Malware Detection and

    In this chapter, readers will explore how machine learning has been applied to build malware detection systems designed for the Windows operating system. This chapter starts by introducing the main components of a Machine Learning pipeline, highlighting the challenges of collecting and maintaining up-to-date datasets. Following this introduction, various state-of-the-art malware detectors are ...

  21. Cryptography

    Cryptography. , Volume 7, Issue 1 (March 2023) - 15 articles. Cover Story ( view full-size image ): Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions.

  22. Advances in Cryptology

    The EUROCRYPT 2024 proceedings focus on foundational theory and mathematics; applied aspects of cryptography; implementation and optimization etc. Advances in Cryptology - EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I ...

  23. Applied Sciences

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Applied Sciences. 2024; 14(9 ...

  24. Home

    Journal of Cryptology is a comprehensive source for original results in modern information security. Provides a forum for original results in all areas of cryptology. Covers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectives. Also discusses implementation, application, and standards issues ...