Information Security ×

Showing 4 of 4 papers in Information Security

Information-Theoretically Secure Trusted Verification Algorithm

Ning Zhenhu, Ning Zhenhu
2025-11-25 ChinaXiv: chinaxiv-202507.00324 Mixed Source

Cryptography is the cornerstone of trusted computing. Currently, classical cryptographic systems are facing severe challenges from quantum computing. While post-quantum cryptography (PQC) can resist known quantum attacks, with the continuous development and maturation of quantum computing, the emerg…

AI-Enabled Network Attack Analysis and Classification

Wang Zhi
2022-01-26 ChinaXiv: chinaxiv-202201.00085

In recent years, alongside the continuous improvement in computer performance, artificial intelligence (Artificial Intelligence, AI) technology has experienced rapid development. AI technology, represented by deep neural networks, has achieved tremendous breakthroughs in numerous domains including a…