Results 51 to 60 of about 21,314 (180)

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]

open access: yes, 2012
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core   +1 more source

Artificial Intelligence for the Design of Symmetric Cryptographic Primitives

open access: yes, 2022
This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief introduction to the basic concepts underlying the field of cryptography, we review the most researched use cases concerning the use of AI techniques and models to design cryptographic primitives, focusing ...
Mariot, L.   +3 more
openaire   +6 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Variable Bit Permutations: Linear Characteristics and Pure VBP-Based Cipher [PDF]

open access: yesComputer Science Journal of Moldova, 2005
This paper describes linear characteristics of the variable bit permutations (VBP) that are used in the form of the data-dependent permutations. This primitive suites well to the design of fast cheap-hardware-oriented ciphers. Because of the existence of
N.A. Moldovyan   +2 more
doaj  

On the Bit Security of Cryptographic Primitives

open access: yes, 2018
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space.
Micciancio, Daniele, Walter, Michael
openaire   +2 more sources

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In smart grid, smart meters are deployed to collect power consumption data periodically, and the data are analyzed to improve the efficiency of power transmission and distribution.
Wei Ren, Liangli Ma, Yi Ren
doaj   +1 more source

One-time memory from isolated Majorana islands

open access: yesNew Journal of Physics, 2022
A one-time memory (OTM) stores two bits such that either bit can be retrieved, but not both. One-time memories have been shown to allow for secure classical and quantum computations.
Sourav Kundu, Ben Reichardt
doaj   +1 more source

Home - About - Disclaimer - Privacy