Reconstructing RSA Private Keys from Random Key Bits [PDF]
We show that an RSA private key with small public exponent can be efficiently recovered given a 0.27 fraction of its bits at random. An important application of this work is to the "cold boot" attacks of Halderman et al. We make new observations about the structure of RSA keys that allow our algorithm to make use of the redundant information in the ...
Nadia Heninger, Hovav Shacham
openaire +1 more source
Polarization-basis tracking scheme for quantum key distribution using revealed sifted key bits [PDF]
8 pages 5 ...
Ding, Yu-Yang +8 more
openaire +3 more sources
A reconfigurable and compact subpipelined architecture for AES encryption and decryption
AES has been used in many applications to provide the data confidentiality. A new 32-bit reconfigurable and compact architecture for AES encryption and decryption is presented and implemented in non-BRAM FPG in this paper.
Ke Li, Hua Li, Graeme Mund
doaj +1 more source
Experimental quantum key distribution with an untrusted source [PDF]
The photon statistics of a quantum key distribution (QKD) source is crucial for security analysis. In this paper, we propose a practical method, with only a beam splitter and photodetector involved, to monitor the photon statistics of a QKD source.
Bingjie Xu +17 more
core +1 more source
We present a practical realization of Rivest-Shamir-Adleman (RSA) with a 2048-bit key on MSP430, a widely used microcontroller in wireless sensor network and Internet of things applications, and show that 2048-bit RSA is feasible on a constrained ...
Utku Gulen, Selcuk Baktir
doaj +1 more source
NEURAL NETWORK-BASED DOUBLE ENCRYPTION FOR JPEG2000 IMAGES
The JPEG2000 is the more efficient next generation coding standard than the current JPEG standard. It can code files witless visual loss, and the file format is less likely to be affected by system file or bit errors.
Qurban Ali Memon
doaj +3 more sources
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj +1 more source
Spatially encoded light for Large-alphabet Quantum Key Distribution [PDF]
Most Quantum Key Distribution protocols use a two-dimensional basis such as HV polarization as first proposed by Bennett and Brassard in 1984. These protocols are consequently limited to a key generation density of 1 bit per photon.
Hooijschuur, P. +4 more
core +4 more sources
Frame Location Method of Unknown Network Protocol Based on TextRank Algorithm [PDF]
In order to solve the difficulty of frame delimitation of communication data in the form of bit stream in unknown network environment,this paper proposes a frame location method based on TextRank algorithm.The weight of nodes in bit stream is determined ...
LIU Zhiguo, SONG Guangyue, CAI Wenzhu, LIU Qingli
doaj +1 more source
Johnson(-like)-Noise-Kirchhoff-Loop Based Secure Classical Communicator Characteristics, for Ranges of Two to Two Thousand Kilometers, via Model-Line [PDF]
A pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any ...
Bennett +14 more
core +2 more sources

