[كتاب][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007‏ - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

Post-quantum hybrid key exchange: a systematic map** study

AA Giron, R Custódio… - Journal of Cryptographic …, 2023‏ - Springer
A key exchange protocol (KEX) is a mechanism that allows two parties to secure their
communications using encryption. Since it was apparent that large-scale quantum …

The complete guide to scion

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022‏ - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

[HTML][HTML] On wide-area IoT networks, lightweight security and their applications—a practical review

A Goulart, A Chennamaneni, D Torre, B Hur… - Electronics, 2022‏ - mdpi.com
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze
collected data over the Internet. IoT devices are located in diverse environments and support …

[PDF][PDF] Evaluation of Some Blockcipher Modes of Operation

P Rogaway - 2011‏ - cs.ucdavis.edu
1. Overview. This report analyzes the security of some 17 cryptographic modes of operation
described within some eight US or international standards. Most of the schemes are …

Design, implementation, and evaluation of a vehicular hardware security module

M Wolf, T Gendrullis - Information Security and Cryptology-ICISC 2011 …, 2012‏ - Springer
Todays in-vehicle IT architectures are dominated by a large network of interactive, software
driven digital microprocessors called electronic control units (ECU). However, ECUs relying …

[كتاب][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017‏ - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …

Sgxio: Generic trusted i/o path for intel sgx

S Weiser, M Werner - Proceedings of the seventh ACM on conference …, 2017‏ - dl.acm.org
Application security traditionally strongly relies upon security of the underlying operating
system. However, operating systems often fall victim to software attacks, compromising …

Cachequote: Efficiently recovering long-term secrets of SGX EPID via cache attacks

F Dall, G De Micheli, T Eisenbarth, D Genkin… - IACR Transactions on …, 2018‏ - par.nsf.gov
Intel Software Guard Extensions (SGX) allows users to perform secure computation on
platforms that run untrusted software. To validate that the computation is correctly initialized …

Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency

AR Sadeghi, T Schneider, M Winandy - International Conference on Trust …, 2010‏ - Springer
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming
more and more important. Pure cryptographic solutions based on fully homomorphic and …