Results 21 to 30 of about 1,726,359 (308)

Reconstructing RSA Private Keys from Random Key Bits [PDF]

open access: yes, 2009
We show that an RSA private key with small public exponent can be efficiently recovered given a 0.27 fraction of its bits at random. An important application of this work is to the "cold boot" attacks of Halderman et al. We make new observations about the structure of RSA keys that allow our algorithm to make use of the redundant information in the ...
Nadia Heninger, Hovav Shacham
openaire   +1 more source

Polarization-basis tracking scheme for quantum key distribution using revealed sifted key bits [PDF]

open access: yesOptics Letters, 2017
8 pages 5 ...
Ding, Yu-Yang   +8 more
openaire   +3 more sources

A reconfigurable and compact subpipelined architecture for AES encryption and decryption

open access: yesEURASIP Journal on Advances in Signal Processing, 2023
AES has been used in many applications to provide the data confidentiality. A new 32-bit reconfigurable and compact architecture for AES encryption and decryption is presented and implemented in non-BRAM FPG in this paper.
Ke Li, Hua Li, Graeme Mund
doaj   +1 more source

Experimental quantum key distribution with an untrusted source [PDF]

open access: yes, 2008
The photon statistics of a quantum key distribution (QKD) source is crucial for security analysis. In this paper, we propose a practical method, with only a beam splitter and photodetector involved, to monitor the photon statistics of a QKD source.
Bingjie Xu   +17 more
core   +1 more source

Side-Channel Resistant 2048-Bit RSA Implementation for Wireless Sensor Networks and Internet of Things

open access: yesIEEE Access, 2023
We present a practical realization of Rivest-Shamir-Adleman (RSA) with a 2048-bit key on MSP430, a widely used microcontroller in wireless sensor network and Internet of things applications, and show that 2048-bit RSA is feasible on a constrained ...
Utku Gulen, Selcuk Baktir
doaj   +1 more source

NEURAL NETWORK-BASED DOUBLE ENCRYPTION FOR JPEG2000 IMAGES

open access: yesJournal of ICT, 2017
The JPEG2000 is the more efficient next generation coding standard than the current JPEG standard. It can code files witless visual loss, and the file format is less likely to be affected by system file or bit errors.
Qurban Ali Memon
doaj   +3 more sources

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj   +1 more source

Spatially encoded light for Large-alphabet Quantum Key Distribution [PDF]

open access: yes, 2019
Most Quantum Key Distribution protocols use a two-dimensional basis such as HV polarization as first proposed by Bennett and Brassard in 1984. These protocols are consequently limited to a key generation density of 1 bit per photon.
Hooijschuur, P.   +4 more
core   +4 more sources

Frame Location Method of Unknown Network Protocol Based on TextRank Algorithm [PDF]

open access: yesJisuanji gongcheng, 2020
In order to solve the difficulty of frame delimitation of communication data in the form of bit stream in unknown network environment,this paper proposes a frame location method based on TextRank algorithm.The weight of nodes in bit stream is determined ...
LIU Zhiguo, SONG Guangyue, CAI Wenzhu, LIU Qingli
doaj   +1 more source

Johnson(-like)-Noise-Kirchhoff-Loop Based Secure Classical Communicator Characteristics, for Ranges of Two to Two Thousand Kilometers, via Model-Line [PDF]

open access: yes, 2008
A pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any ...
Bennett   +14 more
core   +2 more sources

Home - About - Disclaimer - Privacy