نتایج جستجو برای: resilient cryptography
تعداد نتایج: 52839 فیلتر نتایج به سال:
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In th...
NIST is standardizing Post Quantum Cryptography (PQC) algorithms that are resilient to the computational capability of quantum computers. Past works show malicious subversion with cryptographic software (algorithm attacks) weaken implementations. We PQC digital signature codes can be subverted in line previously reported flawed implementations generate verifiable, but less-secure signatures, de...
Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f (x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient P...
چکیده ندارد.
چکیده ندارد.
of “Error Tolerant Cryptography ” by Feng-Hao Liu, Ph.D., Brown University, April 2013. One of the major goals in cryptography is to design protocols that withstand malicious behavior of an adversary. Traditionally, the focus was on a setting where honest users followed their protocol exactly, without fault. But what if an adversary can induce faults, for example a physical attack that changes ...
Abstract We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum (PQC) and information-theoretic security. From cryptographic point view, lattice code-based schemes are among the most promising PQC solutions. Both approaches based hardness decoding problems linear codes different metrics. lattices can be constructed to achieve certain secrecy quantities for wireta...
The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation recent years. Since messages shared among vehicles are always broadcasted by openness environment’ nature, which is vulnerable to several privacy and security problems. To cope with this issue, researchers have proposed pseudonym authentication schemes for the 5G-enabled network. Ne...
چکیده ندارد.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید