Results 21 to 30 of about 95,937 (277)

Information-theoretically secure protocols and security under composition [PDF]

open access: yesProceedings of the thirty-eighth annual ACM symposium on Theory of Computing, 2006
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies security under concurrent composition. This question is motivated by the folklore that all known protocols that are secure in the information-theoretic setting are indeed secure under concurrent ...
Eyal Kushilevitz   +2 more
openaire   +1 more source

Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security [PDF]

open access: yes, 2016
Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known.
Chatzinotas, Symeon   +4 more
core   +2 more sources

Consolidating Security Notions in Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer   +2 more
doaj   +1 more source

Analysis of short blocklength codes for secrecy

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models and analyze their secrecy performance over several cases of concatenated code designs.
Willie K. Harrison   +3 more
doaj   +1 more source

Thinking in Systems, Sifting Through Simulations: A Way Ahead for Cyber Resilience Assessment

open access: yesIEEE Access, 2023
The interaction between the physical world and information technologies creates advantages and novel emerging threats. Cyber-physical systems (CPSs) result vulnerable to cyber-related disruptive scenarios, and, for some critical systems, cyber failures ...
Francesco Simone   +3 more
doaj   +1 more source

Safety analysis of Civil aviation Flight and UAV Operation based on STAMP/STPA [PDF]

open access: yesE3S Web of Conferences
In order to prevent the occurrence of dangerous approaches or accidents in the low-altitude UAV conflict resolution process, the security problem in the process was transformed into the control problem, and a conflict resolution security analysis method ...
Liu Tianyu, liu Jin
doaj   +1 more source

Techniques for Enhanced Physical-Layer Security

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +1 more source

Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security.
Gaëtan Cassiers   +3 more
doaj   +1 more source

Information-theoretic Physical Layer Security for Satellite Channels

open access: yes, 2017
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has access to an identical copy of the cyphertext that Alice sends to Bob. Shannon defined perfect secrecy to be the case when the mutual information between the plaintext and the ...
Hayashi, Masahito   +1 more
core   +1 more source

An information-theoretic security proof for QKD protocols

open access: yes, 2005
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found.
A. Rényi   +10 more
core   +2 more sources

Home - About - Disclaimer - Privacy