Results 1 to 10 of about 65,326 (236)
Physical-Layer Cryptography Through Massive MIMO
We propose the new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret.
Dean, Thomas, Goldsmith, Andrea
core +1 more source
Some Potential Issues with the Security of HTML5 IndexedDB [PDF]
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy +2 more
core +1 more source
A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication
Nowadays, Internet of Things (IoT) devices are rapidly proliferating to support a vast number of end-to-end (E2E) services and applications, which require reliable device authentication for E2E data security.
Peng Hao, Xianbin Wang, Weiming Shen
doaj +1 more source
Cryptographic Data Security for Reliable Wireless Sensor Network
Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications. Attackers might interfere with equipment, and eavesdrop on conversations.
Shabana Urooj +4 more
doaj +1 more source
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy +2 more
core +1 more source
Continuous Variable Quantum Cryptography using Two-Way Quantum Communication
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes ...
A Ferraro +34 more
core +1 more source
HILL: Efficient Low-Latency Implementations of Linear Layers via Heuristic Search
Lightweight cryptography aims to achieve security with minimal resource footprints and low computational overhead. In particular, efficient implementations of linear layers are recognized as a crucial component. Boyar et al.
Yongchao Li +3 more
doaj +1 more source
Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio +4 more
doaj +1 more source
A formal definition and a new security mechanism of physical unclonable functions
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim +5 more
core +1 more source

