Results 91 to 100 of about 21,314 (180)

Improving Physically Unclonable Functions’ Performance Using Second-Order Compensated Measurement

open access: yesInformation
In this paper, we study the performance of second-order compensated measurement to generate a multi-bit response in physically unclonable functions (PUFs).
Jorge Fernández-Aragón   +5 more
doaj   +1 more source

Energy-efficient cryptographic primitives

open access: yesFacta universitatis - series: Electronics and Energetics, 2018
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem.
openaire   +3 more sources

Notions of Reducibility between Cryptographic Primitives [PDF]

open access: yes, 2004
Starting with the seminal paper of Impagliazzo and Rudich [17], there has been a large body of work showing that various cryptographic primitives cannot be reduced to each other via “black-box” reductions. The common interpretation of these results is that there are inherent limitations in using a primitive as a black box, and that these impossibility ...
Salil Vadhan   +2 more
openaire   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Revisiting LFSMs

open access: yes, 2010
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François   +3 more
core   +1 more source

Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks

open access: yesSensors, 2019
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Carmen Camara   +3 more
doaj   +1 more source

A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm

open access: yesIEEE Access
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah   +4 more
doaj   +1 more source

On the composable security of weak coin flipping [PDF]

open access: yesQuantum
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu   +3 more
doaj   +1 more source

Lower Bounds on Signatures from Symmetric Primitives [PDF]

open access: yes, 2019
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most $2^{(1+o(1))q}$, where $q$ is the total number of oracle queries asked by the key generation, signing, and verification algorithms ...
Barak, Boaz, Mahmoody, Mohammad
core   +1 more source

On Bitcoin Security in the Presence of Broken Cryptographic Primitives [PDF]

open access: yes, 2016
Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computational power and advanced cryptanalysis cause primitives to break frequently, and motivate the development of new ones.
Giechaskiel, I, Cremers, C, Rasmussen, K
openaire   +2 more sources

Home - About - Disclaimer - Privacy