Results 1 to 10 of about 4,501,429 (208)

Physical-layer cryptography through massive MIMO [PDF]

open access: yes2013 IEEE Information Theory Workshop (ITW), 2013
We propose the new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret. The goal is for low-complexity encoding and decoding by the desired transmitter-receiver pair, whereas decoding by an eavesdropper is hard in terms of prohibitive complexity.
Thomas R. Dean, Andrea J. Goldsmith
semanticscholar   +5 more sources

Ubic: Bridging the Gap between Digital Cryptography and the Physical World [PDF]

open access: yesEuropean Symposium on Research in Computer Security, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability ...
Simkin, M.   +3 more
semanticscholar   +6 more sources

Physical Protection of Lattice-Based Cryptography [PDF]

open access: yesProceedings of the 2018 Great Lakes Symposium on VLSI, 2018
The impending realization of scalable quantum computers will have a significant impact on today's security infrastructure. With the advent of powerful quantum computers public key cryptographic schemes will become vulnerable to Shor's quantum algorithm, undermining the security current communications systems.
Khalid, Ayesha   +5 more
semanticscholar   +4 more sources

Asymmetric cryptography with physical unclonable keys [PDF]

open access: yesQuantum Science and Technology, 2019
20 pages, 8 ...
Ravitej Uppu   +6 more
openaire   +10 more sources

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

open access: yesIEEE Access, 2021
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor   +2 more
doaj   +2 more sources

Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

open access: yesEnergies, 2022
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn   +7 more
doaj   +2 more sources

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography

open access: yesEntropy, 2022
The growth of data-driven technologies, 5G, and the Internet pose enormous pressure on underlying information infrastructure [...]
Ivan B. Djordjevic
doaj   +4 more sources

Why cryptography should not rely on physical attack complexity [PDF]

open access: yesit - Information Technology, 2016
Abstract This work presents two implementation attacks against cryptographic algorithms. Based on these two presented attacks, this thesis shows that the assessment of physical attack complexity is error-prone. Hence, cryptography should not rely on it.
Juliane Krämer
semanticscholar   +3 more sources

CONFIDENTIALITY OF CYBER-PHYSICAL SYSTEMS USING EVENT-BASED CRYPTOGRAPHY

open access: yesIFAC-PapersOnLine, 2020
Abstract One of the most important challenges for the application of cyber-physical systems (CPS) in smart industries is ensuring its security against cyber attacks. In this paper, we consider that the CPS is abstracted as a Discrete-Event System (DES), and we consider cyber attacks where the intruder eavesdrops the sensor communication channel to ...
Públio M. Lima   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy