Results 1 to 10 of about 65,326 (236)

Physical-Layer Cryptography Through Massive MIMO

open access: yes, 2017
We propose the new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret.
Dean, Thomas, Goldsmith, Andrea
core   +1 more source

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication

open access: yesIEEE Access, 2018
Nowadays, Internet of Things (IoT) devices are rapidly proliferating to support a vast number of end-to-end (E2E) services and applications, which require reliable device authentication for E2E data security.
Peng Hao, Xianbin Wang, Weiming Shen
doaj   +1 more source

Cryptographic Data Security for Reliable Wireless Sensor Network

open access: yesAlexandria Engineering Journal, 2023
Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications. Attackers might interfere with equipment, and eavesdrop on conversations.
Shabana Urooj   +4 more
doaj   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

Quantum cryptography: key distribution and beyond

open access: yes, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy   +2 more
core   +1 more source

Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

open access: yes, 2008
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes ...
A Ferraro   +34 more
core   +1 more source

HILL: Efficient Low-Latency Implementations of Linear Layers via Heuristic Search

open access: yesIACR Transactions on Symmetric Cryptology
Lightweight cryptography aims to achieve security with minimal resource footprints and low computational overhead. In particular, efficient implementations of linear layers are recognized as a crucial component. Boyar et al.
Yongchao Li   +3 more
doaj   +1 more source

Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

open access: yesPRX Quantum, 2021
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio   +4 more
doaj   +1 more source

A formal definition and a new security mechanism of physical unclonable functions

open access: yes, 2012
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy