A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
The persistence of memory: Forensic identification and extraction of cryptographic keys
2009
Digital Investigation. The International Journal of Digital Forensics and Incident Response
We propose novel methods for cryptographic key identification and present a new proof of concept tool named Interrogate that searches through volatile memory and recovers cryptographic keys used by the ...
By using the tool in a virtual digital crime scene, we simulate and examine the different states of systems where well known and popular cryptosystems are installed. ...
Furthermore, we thank the Norwegian Criminal Investigation Service for providing facilities and resources for the project, and Associate Professor Katrin Franke for helpful advice during the writing of ...
doi:10.1016/j.diin.2009.06.002
fatcat:2toxzkkcbbauni2gkk7qpfzfdy
Survey of Promising Technologies for Quantum Drones and Networks
2021
IEEE Access
This technique helps in transmitting the entangled particles to the different receivers located at different locations by using a group of drones. ...
Thus, this cryptosystem is suitable for generic computers, but a smaller key size is expected to successfully implement over small devices having a scarcity of resources. ...
doi:10.1109/access.2021.3109816
fatcat:gkyevfoqrfertef7j7gjzcstii
Cryptographic Algorithms
[chapter]
2015
Applied Cryptography, Second Edition
On the other hand, for symmetric ciphers, the relations that have to be satisfied between sub-round key bits in the key schedule always correspond to a set of nonlinear Boolean equations. ...
In addition to investigating different practical obfuscation techniques that are suitable for the cipher structure, we also compare the performance of these different techniques. ...
keys of DES, AES and RSA. ...
doi:10.1002/9781119183471.part3
fatcat:rvk3izmftvebbkajuc7xzha6fe
Survey on cyberspace security
2015
Science China Information Sciences
In this era, people live and work in cyberspace. Cyberspace is the collection of all information systems; it is the information environment for human survival. ...
This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself ...
We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun. ...
doi:10.1007/s11432-015-5433-4
fatcat:b2tv6gvovngxhlz7iukug2ehiy
Data Encryption Standard (DES)
[chapter]
2011
Encyclopedia of Cryptography and Security
A careful study of the cycle structure of DES for weak and semi-weak keys has been given by Moore and Simmons [30] . ...
The speed of this proposal is as for single DES, but it has a slower key-schedule. r Slow key-schedule (Quisquater et al. [32] or Knudsen [10] ). ...
Security analysis for a generalization of DSS is given in [1] . To discuss signature length we fix concrete security parameters. ...
doi:10.1007/978-1-4419-5906-5_568
fatcat:wly6ca3tv5e2pc2woejsoaoubm
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
2007
Journal on spesial topics in mobile networks and applications
Using a real-life metaphor, a sensor node can be abstracted as the "sensing cells" of a living system and the base station as the "brain" of such system, the ultimate destination of all signals generated ...
Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives ...
The first author has been funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario". ...
doi:10.1007/s11036-007-0024-2
fatcat:zaqwex2ds5frfa4pjw7klclpvu
Privacy and authentication: An introduction to cryptography
1979
Proceedings of the IEEE
o f the a p p t i a t i o n of uyptography to the security of timeduring systems and computer networks. ...
Akmct-This paper plesenfs a tutorial introduction to contempomy ayptography. ...
There is a close analogy here with a general purpose digital computer and a program. ...
doi:10.1109/proc.1979.11256
fatcat:dctzswht4jdcpprjsdvstzotmi
Enhancing the Security of Spin Framework by Combining Min AES with Geoencryption
2020
International journal of computer science and mobile computing
like farming and agriculture, patient monitoring in health care, residential applications like energy management, for safety and efficiency in vehicular networks to outer space explorations. ...
Wireless sensor networks are contemporary technologies that are used for various purposes in different fields including military and security monitoring, home security, industrial processes/activities ...
In Mini-AES, the 16-bit secret key is passed through a key-schedule to produce one 16-bit round key, K0 to be used prior to the first round, and a 16-bit round key, Ki for use in each round of Mini-AES ...
doi:10.47760/ijcsmc.2020.v09i10.007
fatcat:nfu2jarilfdzba5mt62jyvjkoq
A Comprehensive Survey on ID-Based Cryptography for Wireless Sensor Networks
2018
Journal of Military Technology
In this paper we are presenting a thorough analysis on identity based cryptographic primitives, techniques, implementation variants and issues. ...
While lightweight cryptographic algorithms are still under close supervision by NIST, identity based cryptography (IBC) holds its ground as a viable security approach for WSN based applications. ...
Distributed Key Generator Another interesting feature presented in [2] as a viable variant, fully addressed in papers like [8] [9] [10] , is the existence of a Distributed Key Generator using threshold ...
doi:10.32754/jmt.2018.1.10
fatcat:k22rsoaovrbltlkwbirjzvx7ri
Post-Quantum Cryptography
[chapter]
2011
Encyclopedia of Cryptography and Security
laws and regulations and therefore free for general use. ...
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective ...
We also thank Richard Lindner, Vadim Lyubashevsky, and Chris Peikert for comments on an earlier version. ...
doi:10.1007/978-1-4419-5906-5_386
fatcat:ucdkilta7zc3voq7nqctmjkcr4
Fault-Tolerant Non-interference
[chapter]
2014
Lecture Notes in Computer Science
We develop a software-based technique to achieve this faulttolerant non-interference property. ...
A precise characterization of the class of programs for which the method guarantees transparency is provided. ...
Acknowledgment Many thanks to Johan Karlsson, Ioannis Sourdis, Georgi Gaydadjiev, Arshad Jhumka and the anonymous referees for useful comments and observations. ...
doi:10.1007/978-3-319-04897-0_5
fatcat:ntd3mb6i25go5pb6hgrxk7vaji
Applied cryptography: Protocols, algorithms, and source code in C
1994
Computer Law and Security Review
FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians. ...
After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D. ...
DES is a symmetric algorithm: The same algorithm and key are used for both encryption and decryption (except for minor differences in the key schedule). The key length is 56 bits. ...
doi:10.1016/0267-3649(94)90017-5
fatcat:y5tchirflfdwno7dm4dv6ljx2a
Security in embedded systems
2004
ACM Transactions on Embedded Computing Systems
Security has been the subject of intensive research in the context of general-purpose computing and communications systems. ...
Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low-and high-end ...
For example, it has been shown in Messerges et al. [2002] that the brute-force search space for a SW DES implementation on an 8-bit processor with 7 bytes of key data can be reduced to 2 40 keys from ...
doi:10.1145/1015047.1015049
fatcat:2x62l5pmdnawhnisbbfdvvgkly
Survey on power analysis attacks and its impact on intelligent sensor networks
2018
IET Wireless Sensor Systems
The sensors also known as edge nodes form the lower-most tier in the internet of things architecture. These devices rely on cryptographic technique to ensure 'root of trust' for the users. ...
The implementation attacks namely side-channel attacks (SCAs) pose a dangerous threat for the cryptographic implementation in the edge nodes since the attacks are undetectable by nature. ...
This work was also supported by Special Manpower Development Programme for Chips to System Design (SMDP-C2SD) project sponsored by the Department of Electronics and Information Technology (DeitY), Government ...
doi:10.1049/iet-wss.2018.5157
fatcat:yz3uqnnfxndm7ji4exh3crhruu
HyperDegrade: From GHz to MHz Effective CPU Frequencies
[article]
2021
arXiv
pre-print
In addition to the new technique, we investigate the root causes of performance degradation using cache eviction, discovering a previously unknown slowdown origin. ...
Using HyperDegrade, we developed an end-to-end attack that shows how a Raccoon-like attack can succeed with real data, filling a missing gap from previous research. ...
In general, our off-the-shelf applied lattice techniques in Section 6.3, while serving their purpose for proof-of-concept, are likely not optimal. ...
arXiv:2101.01077v2
fatcat:bbp5r4rogzdwtenccozu5ma7le
« Previous
Showing results 1 — 15 out of 255 results