Results 31 to 40 of about 41,930 (264)

Hardware Implementation of the GPS authentication [PDF]

open access: yes, 2012
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël   +2 more
core   +4 more sources

On Recovering Affine Encodings in White-Box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure white-box implementation of AES has remained an enduring challenge.
Patrick Derbez   +3 more
doaj   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

open access: yesConnection Science, 2022
Internet of Things (IoT) devices require lower power consumption with higher security, which can be achieved by using lightweight cryptography (LWC) approaches. Attribute-based encryption (ABE) provides a fine-grained access control policy over encrypted
Mounika Jammula   +2 more
doaj   +1 more source

A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification

open access: yesIEEE Access, 2022
Telecare Medical Information Systems (TMIS) is a highly focused and unique domain providing healthcare services remotely, the development and advancement in the realm of information and communication technologies boosted the development of TMIS ...
Shaik Shakeel Ahamad   +2 more
doaj   +1 more source

WAS: improved white-box cryptographic algorithm over AS iteration

open access: yesCybersecurity, 2023
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.
Yatao Yang   +3 more
doaj   +1 more source

Experimental realization of a highly secure chaos communication under strong channel noise

open access: yes, 2004
A one-way coupled spatiotemporally chaotic map lattice is used to contruct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better ...
Blahut   +28 more
core   +1 more source

Quantum states with a positive partial transpose are useful for metrology [PDF]

open access: yes, 2018
We show that multipartite quantum states that have a positive partial transpose with respect to all bipartitions of the particles can outperform separable states in linear interferometers. We introduce a powerful iterative method to find such states.
Tóth, Géza, Vértesi, Tamás
core   +2 more sources

Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations

open access: yes, 2010
We show that monogamy of Bell's inequality violations, which is strictly weaker condition than no-signaling is enough to prove security of quantum key distribution.
Pawlowski, Marcin
core   +1 more source

Entangled photon apparatus for the undergraduate laboratory

open access: yes, 2002
We present detailed instructions for constructing and operating an apparatus to produce and detect polarization-entangled photons. The source operates by type-I spontaneous parametric downconversion in a two-crystal geometry.
Bell J. S.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy