Results 11 to 20 of about 65,326 (236)

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Exploring the intersection of natural sciences and information technology via entropy and randomness [PDF]

open access: yesNature Communications
Physical sources of randomness are indispensable for information technology and cryptography. Yet, the usefulness of random processes seems to be ignored by many natural science researchers, who are exposed to the downsides of randomness, which adds ...
Anne M. Luescher   +2 more
doaj   +2 more sources

Traffic Classification Method Based on Side-Channel Features for Security Proxy [PDF]

open access: yesJisuanji gongcheng, 2021
In recent years, security proxy has been utilized by more and more users to circumvent Internet censorship and access restricted resources. The classification of security proxy traffic is of great significance for network security and network management.
GAO Ping, GUANG Hui, CHEN Xi, LI Guangsong
doaj   +1 more source

2D physically unclonable functions of the arbiter type

open access: yesInformatika, 2023
Objectives. The problem of constructing a new class of physically unclonable functions of the arbiter type (APUF) is being solved, based on the difference in delay times for the inputs of numerous modifications of the base element, due to both an ...
V. N. Yarmolik, A. A. Ivaniuk
doaj   +1 more source

Creating and balancing the paths of arbiter-based physically unclonable functions on FPGA

open access: yesInformatika, 2022
Objectives. The problem of constructing a new structure of paths of physically unclonable function of the arbiter type (APUF) on the FPGA is being solved, based on the full use of internal resources of LUT-blocks, which are functionally repeaters.
A. Yu. Shamyna, A. A. Ivaniuk
doaj   +1 more source

Investigation of the Timing Parameters of The Arbiter-Based Physically Unclonable Function Using a Ring Oscillator

open access: yesЦифровая трансформация, 2022
The possibility of using a ring oscillator circuit for measuring the propagation delays of signals through symmetrical APUF paths of various lengths implemented on an FPGA is considered.
A. Yu. Shamyna, A. A. Ivaniuk
doaj   +1 more source

Physically unclonable functions with controlled propagation delay

open access: yesInformatika, 2022
O b j e c t i v e s. The problem of constructing a new class of physically uncloneable functions (PUF) based on controlling the signal propagation delay through the elements lying on the path of its propagation is being solved.
V. N. Yarmolik   +2 more
doaj   +1 more source

Automatic Balancing of “Arbiter” Physical Unclonable Function Paths

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2023
The features of building on the basis of programmable logic integrated circuits of “arbiter” physical unclonable functions (APUF) are considered. The problem of asymmetry of pairs of APUF paths is indicated and the negative impact of this phenomenon on ...
A. Yu. Shamyna, A. A. Ivaniuk
doaj   +1 more source

Arbiter Physical Unclonable Functions with Asymmetric Pairs of Paths

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2022
The methods of constructing physical unclonable functions (PUF), which are the basis of physical cryptography, are analyzed. The broad applicability of the Arbiter PUF, based on the analysis of the delays of the signal transmitted along two paths, is ...
V. N. Yarmolik, A. A. Ivaniuk
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy