Results 21 to 30 of about 26,946 (315)

A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network

open access: yesMathematics, 2022
Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked.
Long Yin, Jian Xu, Zihao Wang, Chen Wang
doaj   +1 more source

Practical and Provably Secure Distance-Bounding [PDF]

open access: yesJournal of Computer Security, 2015
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding ...
Boureanu, Ioana   +2 more
openaire   +4 more sources

Secure Two-Party Computation over a Z-Channel [PDF]

open access: yes, 2011
In secure two-party computation, two mutually distrusting parties are interested in jointly computing a function, while preserving the privacy of their respective inputs.
Palmieri, Paolo   +2 more
core   +2 more sources

A Model for Provably Secure Software Design [PDF]

open access: yes2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE), 2017
Both academia and industry advocate the security by design principle to stress the importance of dealing with security from the earliest stages in software development. Nevertheless, designers often have to resort to their own knowledge and experience to pro-actively identify and mitigate potential security problems.
van den Berghe, Alexander   +3 more
openaire   +3 more sources

Robustness of the BB84 quantum key distribution protocol against general coherent attacks [PDF]

open access: yes, 2005
It is demonstrated that for the entanglement-based version of the Bennett-Brassard (BB84) quantum key distribution protocol, Alice and Bob share provable entanglement if and only if the estimated qubit error rate is below 25% or above 75%. In view of the
Alber, G, Khalique, A, Nikolopoulos, G M
core   +2 more sources

Efficient and Provable White-Box Primitives [PDF]

open access: yes, 2016
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov   +27 more
core   +4 more sources

Practical Provably Secure Flooding for Blockchains

open access: yes, 2022
Advances in Cryptology – ASIACRYPT ...
Chen-Da Liu-Zhang   +4 more
openaire   +3 more sources

Enabling image optimisation and artificial intelligence technologies for better Internet of Things framework to predict COVID

open access: yesIET Networks, EarlyView., 2022
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla   +2 more
wiley   +1 more source

On the Provable Security of the Dragonfly Protocol [PDF]

open access: yes, 2015
Dragonfly is a password-authenticated key exchange protocol that was proposed by Harkinsi¾ź[11] in 2008. It is currently a candidate for standardization by the Internet Engineering Task Force, and would greatly benefit from a security proof. In this paper, we prove the security of a very close variant of Dragonfly in the random oracle model.
Skrobot, Marjan, Lancrenon, Jean
openaire   +3 more sources

On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary tweak(ey) size kn for all k ≥ 1, and arbitrary number of rounds r ≥ 2.
Benoît Cogliati   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy