Results 21 to 30 of about 95,453 (277)
Information-theoretically secure protocols and security under composition [PDF]
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies security under concurrent composition. This question is motivated by the folklore that all known protocols that are secure in the information-theoretic setting are indeed secure under concurrent ...
Eyal Kushilevitz +2 more
openaire +1 more source
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe +5 more
core +2 more sources
Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security [PDF]
Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known.
Chatzinotas, Symeon +4 more
core +2 more sources
Consolidating Security Notions in Hardware Masking
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer +2 more
doaj +1 more source
Thinking in Systems, Sifting Through Simulations: A Way Ahead for Cyber Resilience Assessment
The interaction between the physical world and information technologies creates advantages and novel emerging threats. Cyber-physical systems (CPSs) result vulnerable to cyber-related disruptive scenarios, and, for some critical systems, cyber failures ...
Francesco Simone +3 more
doaj +1 more source
Safety analysis of Civil aviation Flight and UAV Operation based on STAMP/STPA [PDF]
In order to prevent the occurrence of dangerous approaches or accidents in the low-altitude UAV conflict resolution process, the security problem in the process was transformed into the control problem, and a conflict resolution security analysis method ...
Liu Tianyu, liu Jin
doaj +1 more source
Analysis of short blocklength codes for secrecy
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models and analyze their secrecy performance over several cases of concatenated code designs.
Willie K. Harrison +3 more
doaj +1 more source
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security.
Gaëtan Cassiers +3 more
doaj +1 more source
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao +2 more
core +1 more source
An information-theoretic security proof for QKD protocols
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found.
A. Rényi +10 more
core +2 more sources

