Results 21 to 30 of about 26,946 (315)
A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network
Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked.
Long Yin, Jian Xu, Zihao Wang, Chen Wang
doaj +1 more source
Practical and Provably Secure Distance-Bounding [PDF]
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding ...
Boureanu, Ioana +2 more
openaire +4 more sources
Secure Two-Party Computation over a Z-Channel [PDF]
In secure two-party computation, two mutually distrusting parties are interested in jointly computing a function, while preserving the privacy of their respective inputs.
Palmieri, Paolo +2 more
core +2 more sources
A Model for Provably Secure Software Design [PDF]
Both academia and industry advocate the security by design principle to stress the importance of dealing with security from the earliest stages in software development. Nevertheless, designers often have to resort to their own knowledge and experience to pro-actively identify and mitigate potential security problems.
van den Berghe, Alexander +3 more
openaire +3 more sources
Robustness of the BB84 quantum key distribution protocol against general coherent attacks [PDF]
It is demonstrated that for the entanglement-based version of the Bennett-Brassard (BB84) quantum key distribution protocol, Alice and Bob share provable entanglement if and only if the estimated qubit error rate is below 25% or above 75%. In view of the
Alber, G, Khalique, A, Nikolopoulos, G M
core +2 more sources
Efficient and Provable White-Box Primitives [PDF]
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov +27 more
core +4 more sources
Practical Provably Secure Flooding for Blockchains
Advances in Cryptology – ASIACRYPT ...
Chen-Da Liu-Zhang +4 more
openaire +3 more sources
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla +2 more
wiley +1 more source
On the Provable Security of the Dragonfly Protocol [PDF]
Dragonfly is a password-authenticated key exchange protocol that was proposed by Harkinsi¾ź[11] in 2008. It is currently a candidate for standardization by the Internet Engineering Task Force, and would greatly benefit from a security proof. In this paper, we prove the security of a very close variant of Dragonfly in the random oracle model.
Skrobot, Marjan, Lancrenon, Jean
openaire +3 more sources
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary tweak(ey) size kn for all k ≥ 1, and arbitrary number of rounds r ≥ 2.
Benoît Cogliati +3 more
doaj +1 more source

