Results 21 to 30 of about 4,501,528 (307)

Physically unclonable functions with controlled propagation delay

open access: yesInformatika, 2022
O b j e c t i v e s. The problem of constructing a new class of physically uncloneable functions (PUF) based on controlling the signal propagation delay through the elements lying on the path of its propagation is being solved.
V. N. Yarmolik   +2 more
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

What Physical Layer Security Can Do for 6G Security [PDF]

open access: yesIEEE Open Journal of Vehicular Technology, 2022
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance.
Miroslav Mitev   +3 more
semanticscholar   +1 more source

Physical Unclonable Functions (PUF) for IoT Devices [PDF]

open access: yesACM Computing Surveys, 2022
Physical Unclonable Function (PUF) has recently attracted interest from both industry and academia as a potential alternative approach to secure Internet of Things (IoT) devices from the more traditional computational-based approach using conventional ...
Abdulaziz Al-Meer, S. Al-kuwari
semanticscholar   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Unrolled Cryptography on Silicon A Physical Security Analysis

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Cryptographic primitives with low-latency performance have gained momentum lately due to an increased demand for real-time applications. Block ciphers such as PRINCE enable data encryption (resp.
Thorben Moos
semanticscholar   +1 more source

Physically Observable Cryptography [PDF]

open access: yes, 2004
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that exploit the information leakage (via electromagnetic fields, power consumption, etc.) inherent in the physical execution of any cryptographic algorithm.
Silvio Micali, Leonid Reyzin
openaire   +1 more source

Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain

open access: yesIEEE Transactions on Network and Service Management, 2023
The inclusion of drones in Internet of Vehicles (IoV) is a current trend that presents significant trade-offs. On the one hand, Unmanned Aerial Vehicles (UAVs) provide advantages such as enabling ground communications also when physical obstacles limit ...
Mohamed A. El-Zawawy   +2 more
semanticscholar   +1 more source

Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2021
Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential to transform the world.
Felix O. Olowononi   +2 more
semanticscholar   +1 more source

Cryptography and law: The case of Brazil

open access: yesЦифровое право, 2022
In a digitalised environment under conditions of reduced limits and boundaries between physical and virtual worlds, people’s daily activities increasingly migrate to cyberspace.
O. V. Cardoso
doaj   +1 more source

Home - About - Disclaimer - Privacy