Security of quantum key distribution
HP Yuen - IEEE Access, 2016 - ieeexplore.ieee.org
The security issues facing quantum key distribution (QKD) are explained, herein focusing on
those issues that are cryptographic and information theoretic in nature and not those based …
those issues that are cryptographic and information theoretic in nature and not those based …
Wg-8: A lightweight stream cipher for resource-constrained smart devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices
like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a …
like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a …
Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT
A Sghaier Omar, O Basir - Blockchain Cybersecurity, Trust and Privacy, 2020 - Springer
The proliferation of IoT devices across various application domains led to a high level of
heterogeneity which introduced new device management challenges. These challenges …
heterogeneity which introduced new device management challenges. These challenges …
XOR encryption versus phase encryption, an in-depth analysis
Encryptions are used in almost all standards to ensure the confidentiality of the data.
Encryptions can be and indeed are implemented in the different layers of a network protocol …
Encryptions can be and indeed are implemented in the different layers of a network protocol …
Perfect Gaussian Integer Sequences of Odd Period
CD Lee, YP Huang, Y Chang… - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
In this letter, some perfect Gaussian integer sequences of period 2 m-1 are proposed based
on the trace representations of Legendre sequences, Hall's sextic residue sequences, m …
on the trace representations of Legendre sequences, Hall's sextic residue sequences, m …
Hyperspectral remote sensing data compression and protection
MV Gashnikov, NI Glumov, AV Kuznetsov… - Компьютерная …, 2016 - cyberleninka.ru
In this paper, we consider methods for hyperspectral image processing, required in systems
of image formation, storage, and transmission and aimed at solving problems of data …
of image formation, storage, and transmission and aimed at solving problems of data …
Indistinguishability and energy sensitivity of Gaussian and Bernoulli compressed encryption
NY Yu - IEEE Transactions on Information Forensics and …, 2018 - ieeexplore.ieee.org
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the
notion of security. The Gaussian one-time sensing (G-OTS) CS-based cryptosystem …
notion of security. The Gaussian one-time sensing (G-OTS) CS-based cryptosystem …
A new efficient physical layer OFDM encryption scheme
In this paper, we propose a new encryption scheme for OFDM systems. The reason for
physical layer approach is that it has the least impact on the system and is the fastest among …
physical layer approach is that it has the least impact on the system and is the fastest among …
New implementations of the WG stream cipher
H El-Razouk, A Reyhani-Masoleh… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper presents two new hardware designs of the Welch-Gong (WG)-128 cipher, one for
the multiple output WG (MOWG) version, and the other for the single output version WG …
the multiple output WG (MOWG) version, and the other for the single output version WG …
Essential elements lacking in security proofs for quantum key distribution
HP Yuen - Emerging Technologies in Security and Defence; …, 2013 - spiedigitallibrary.org
All the currently available unconditional security proofs on quantum key distribution, in
particular for the BB84 protocol and its variants including continuous-variable ones, are …
particular for the BB84 protocol and its variants including continuous-variable ones, are …