Results 21 to 30 of about 95,937 (277)
Information-theoretically secure protocols and security under composition [PDF]
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies security under concurrent composition. This question is motivated by the folklore that all known protocols that are secure in the information-theoretic setting are indeed secure under concurrent ...
Eyal Kushilevitz +2 more
openaire +1 more source
Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security [PDF]
Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known.
Chatzinotas, Symeon +4 more
core +2 more sources
Consolidating Security Notions in Hardware Masking
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer +2 more
doaj +1 more source
Analysis of short blocklength codes for secrecy
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models and analyze their secrecy performance over several cases of concatenated code designs.
Willie K. Harrison +3 more
doaj +1 more source
Thinking in Systems, Sifting Through Simulations: A Way Ahead for Cyber Resilience Assessment
The interaction between the physical world and information technologies creates advantages and novel emerging threats. Cyber-physical systems (CPSs) result vulnerable to cyber-related disruptive scenarios, and, for some critical systems, cyber failures ...
Francesco Simone +3 more
doaj +1 more source
Safety analysis of Civil aviation Flight and UAV Operation based on STAMP/STPA [PDF]
In order to prevent the occurrence of dangerous approaches or accidents in the low-altitude UAV conflict resolution process, the security problem in the process was transformed into the control problem, and a conflict resolution security analysis method ...
Liu Tianyu, liu Jin
doaj +1 more source
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao +2 more
core +1 more source
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security.
Gaëtan Cassiers +3 more
doaj +1 more source
Information-theoretic Physical Layer Security for Satellite Channels
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has access to an identical copy of the cyphertext that Alice sends to Bob. Shannon defined perfect secrecy to be the case when the mutual information between the plaintext and the ...
Hayashi, Masahito +1 more
core +1 more source
An information-theoretic security proof for QKD protocols
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found.
A. Rényi +10 more
core +2 more sources

