Results 1 to 10 of about 4,501,429 (208)
Physical-layer cryptography through massive MIMO [PDF]
We propose the new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret. The goal is for low-complexity encoding and decoding by the desired transmitter-receiver pair, whereas decoding by an eavesdropper is hard in terms of prohibitive complexity.
Thomas R. Dean, Andrea J. Goldsmith
semanticscholar +5 more sources
Ubic: Bridging the Gap between Digital Cryptography and the Physical World [PDF]
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability ...
Simkin, M. +3 more
semanticscholar +6 more sources
Physical Protection of Lattice-Based Cryptography [PDF]
The impending realization of scalable quantum computers will have a significant impact on today's security infrastructure. With the advent of powerful quantum computers public key cryptographic schemes will become vulnerable to Shor's quantum algorithm, undermining the security current communications systems.
Khalid, Ayesha +5 more
semanticscholar +4 more sources
Asymmetric cryptography with physical unclonable keys [PDF]
20 pages, 8 ...
Ravitej Uppu +6 more
openaire +10 more sources
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor +2 more
doaj +2 more sources
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn +7 more
doaj +2 more sources
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li +4 more
doaj +2 more sources
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
The growth of data-driven technologies, 5G, and the Internet pose enormous pressure on underlying information infrastructure [...]
Ivan B. Djordjevic
doaj +4 more sources
Why cryptography should not rely on physical attack complexity [PDF]
Abstract This work presents two implementation attacks against cryptographic algorithms. Based on these two presented attacks, this thesis shows that the assessment of physical attack complexity is error-prone. Hence, cryptography should not rely on it.
Juliane Krämer
semanticscholar +3 more sources
CONFIDENTIALITY OF CYBER-PHYSICAL SYSTEMS USING EVENT-BASED CRYPTOGRAPHY
Abstract One of the most important challenges for the application of cyber-physical systems (CPS) in smart industries is ensuring its security against cyber attacks. In this paper, we consider that the CPS is abstracted as a Discrete-Event System (DES), and we consider cyber attacks where the intruder eavesdrops the sensor communication channel to ...
Públio M. Lima +2 more
openaire +2 more sources

