Security of quantum key distribution

HP Yuen - IEEE Access, 2016 - ieeexplore.ieee.org
The security issues facing quantum key distribution (QKD) are explained, herein focusing on
those issues that are cryptographic and information theoretic in nature and not those based …

Wg-8: A lightweight stream cipher for resource-constrained smart devices

X Fan, K Mandal, G Gong - … networking for quality, reliability, security and …, 2013 - Springer
Lightweight cryptographic primitives are essential for securing pervasive embedded devices
like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a …

Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT

A Sghaier Omar, O Basir - Blockchain Cybersecurity, Trust and Privacy, 2020 - Springer
The proliferation of IoT devices across various application domains led to a high level of
heterogeneity which introduced new device management challenges. These challenges …

XOR encryption versus phase encryption, an in-depth analysis

F Huo, G Gong - IEEE Transactions on Electromagnetic …, 2015 - ieeexplore.ieee.org
Encryptions are used in almost all standards to ensure the confidentiality of the data.
Encryptions can be and indeed are implemented in the different layers of a network protocol …

Perfect Gaussian Integer Sequences of Odd Period

CD Lee, YP Huang, Y Chang… - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
In this letter, some perfect Gaussian integer sequences of period 2 m-1 are proposed based
on the trace representations of Legendre sequences, Hall's sextic residue sequences, m …

Hyperspectral remote sensing data compression and protection

MV Gashnikov, NI Glumov, AV Kuznetsov… - Компьютерная …, 2016 - cyberleninka.ru
In this paper, we consider methods for hyperspectral image processing, required in systems
of image formation, storage, and transmission and aimed at solving problems of data …

Indistinguishability and energy sensitivity of Gaussian and Bernoulli compressed encryption

NY Yu - IEEE Transactions on Information Forensics and …, 2018 - ieeexplore.ieee.org
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the
notion of security. The Gaussian one-time sensing (G-OTS) CS-based cryptosystem …

A new efficient physical layer OFDM encryption scheme

F Huo, G Gong - IEEE INFOCOM 2014-IEEE Conference on …, 2014 - ieeexplore.ieee.org
In this paper, we propose a new encryption scheme for OFDM systems. The reason for
physical layer approach is that it has the least impact on the system and is the fastest among …

New implementations of the WG stream cipher

H El-Razouk, A Reyhani-Masoleh… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper presents two new hardware designs of the Welch-Gong (WG)-128 cipher, one for
the multiple output WG (MOWG) version, and the other for the single output version WG …

Essential elements lacking in security proofs for quantum key distribution

HP Yuen - Emerging Technologies in Security and Defence; …, 2013 - spiedigitallibrary.org
All the currently available unconditional security proofs on quantum key distribution, in
particular for the BB84 protocol and its variants including continuous-variable ones, are …