News

The aim of this paper is to propose an MFA (Multi-Factor Authentication) algorithm using MAC address that achieves authentication and authorization in a secure and efficient manner. At first aim to ...
Use the string retrieved by this property to set the message authentication code (MAC) algorithm name when you call the OpenAlgorithm method. The string represents an Advanced Encryption Standard (AES ...
The post-quantum cryptographic algorithm standards differ in several ways from the candidate implementations and specifications that development teams deliver to NIST. atsec can provide a gap ...
In our particular case, we will focus on the ESP-NOW transmission protocol on which our algorithm will be grafted in order to optimize the level of security. As shown in Figure 1, symmetric ...
Google announces new algorithm that makes FIDO encryption safe from quantum computers New approach combines ECDSA with post-quantum algorithm called Dilithium.
BSI certifies first smartcard with post-quantum cryptographic algorithm The BSI has certified the first quantum-safe smartcard. This means that quantum computers cannot crack the encryption of data.
Secure Authentication and Authorization with MAC Address and Cryptography-Based Multi-Factor Algorithm Abstract: The aim of this paper is to propose an MFA (Multi-Factor Authentication) algorithm ...