Machine-learning attacks on interference-based optical encryption: experimental demonstration

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks on Message Stream Encryption

Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited authentication to BitTorrent clients. Although obfuscation of header and payload data was the main design goal of MSE, users understandably still expect data confidentiality and authentication from their BitTorrent clients. In this paper, we present numerous attacks on the MSE protocol itself, independent of...

متن کامل

Learning Robot Behaviour and Skills Based on Human Demonstration and Advice: The Machine Learning Paradigm

Service robots require easy programming methods allowing the unexperienced human user to easily integrate motion and perception skills or complex problem solving strategies. To achieve this goal, robots should learn from operators how and what to do considering hardand software constraints. Various approaches modelling the man-machine skill transfer have been proposed. Systems following the Pro...

متن کامل

Experimental Demonstration of Modulation-Dependent Nonlinear Interference in Optical Fibre Communication

For the first time the modulation format dependence of nonlinear interference in long-haul optical fibre transmission is experimentally demonstrated for polarisation-division multiplexed 4, 16, 64

متن کامل

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption

Although lattice-based cryptography has proven to be a particularly efficient approach to post-quantum cryptography, its security against side-channel attacks is still a very open topic. There already exist some first works that use masking to achieve DPA security. However, for public-key primitives SPA attacks that use just a single trace are also highly relevant. For lattice-based cryptograph...

متن کامل

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes

Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack techniques on various cryptosystems have been proposed. Most of these techniques, like Differential Fault Analysis, Safe Error Attack, and Collision Fault Analysis have the requirement to process two inputs that are either identical or related, in order to generate pairs of correct/faulty cipherte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Optics Express

سال: 2019

ISSN: 1094-4087

DOI: 10.1364/oe.27.026143