Absolute security in terahertz wireless links

A Cohen, RGL D'Oliveira, CY Yeh… - IEEE journal of …, 2023 - ieeexplore.ieee.org
Security against eavesdrop** is one of the key concerns in the design of any
communication system. Many common considerations of the security of a wireless …

Overcoming leakage in scalable quantum error correction

KC Miao, M McEwen, J Atalaya, D Kafri… - arxiv preprint arxiv …, 2022 - arxiv.org
Leakage of quantum information out of computational states into higher energy states
represents a major challenge in the pursuit of quantum error correction (QEC). In a QEC …

AES as error correction: Cryptosystems for reliable communication

A Cohen, RGL D'Oliveira, KR Duffy… - IEEE …, 2023 - ieeexplore.ieee.org
In this letter, we show that the Advanced Encryption Standard (AES) cryptosystem can be
utilized as an error-correcting code to obtain reliability over noisy communication and data …

Coding-based hybrid post-quantum cryptosystem for non-uniform information

S Tarnopolsky, A Cohen - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We introduce for non-uniform messages a novel hybrid universal network coding
cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) …

Crypto-mine: Cryptanalysis via mutual information neural estimation

BD Kim, VA Vasudevan, J Woo… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems
has an extensive history. However, estimating MI between unknown random variables in a …

CERMET: Coding for Energy Reduction with Multiple Encryption Techniques --

J Woo, VA Vasudevan, B Kim, A Cohen… - arxiv preprint arxiv …, 2023 - arxiv.org
This paper presents CERMET, an energy-efficient hardware architecture designed for
hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction …

Network Coding-Based Post-Quantum Cryptography for Multi-Users with Different Security Permissions

A Cohen, RGL D'Oliveira - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We present a novel multi-legitimate-users hybrid universal network-coding cryptosystem
which provides secure Post-Quantum (PQ) cryptography at high communication rates for …

Cryptanalysis via Machine Learning Based Information Theoretic Metrics

BD Kim, VA Vasudevan, RGL D'Oliveira… - arxiv preprint arxiv …, 2025 - arxiv.org
The fields of machine learning (ML) and cryptanalysis share an interestingly common
objective of creating a function, based on a given set of inputs and outputs. However, the …

A new security measure in secret sharing schemes and secure network coding

I Kurihara, J Kurihara, T Tanaka - IEEE Access, 2024 - ieeexplore.ieee.org
Linear secret sharing schemes protect secret information from leakage and destruction by
encoding secret information into multiple shares, where the secret information can be …

Error Correction Capabilities of Non-Linear Cryptographic Hash Functions

A Cohen, RGL D'Oliveira - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
Linear hashes are known to possess error-correcting capabilities. However, in most
applications, non-linear hashes with pseudorandom outputs are utilized instead. It has also …