Linked e-resources

Details

Intro
Preface
Organization
Contents
Cryptography
Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher
1 Introduction
2 Preliminaries
2.1 Cryptographic Hash Function
2.2 Pseudorandom Function
2.3 Tweakable Block Cipher in TWEAKEY Framework
2.4 PRF and TPRP Under Related-Key Attack
3 Proposed Construction
4 Collision Resistance
5 Pseudorandom-Function Property
References
Provably Secure Password-Authenticated Key Exchange Based on SIDH
1 Introduction
2 Preliminaries
2.1 SIDH

2.2 Standard Isogeny-Based Hard Problems
3 The Proposed PAKE
3.1 Description of the Proposed PAKE
3.2 Comparison with Relevant Works
4 Security Analysis of the Proposed PAKE
4.1 Informal Security Analysis
4.2 Security in the BPR Model
5 Conclusion
References
Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups
1 Introduction
1.1 Our Contribution
2 Preliminaries
2.1 Syntax of GSdT
2.2 Security Definitions of GSdT
3 Our Instantiation
3.1 Generic Constriction of GSdT in ch3AnadaFH21

3.2 Key Generation and User Joining
3.3 Generating and Verifying a Group Signature
3.4 Opening and Judging
4 Properties
4.1 Security
4.2 Asymptotic Performance
5 Conclusion
References
Grover on SPARKLE
1 Introduction
1.1 Our Contribution and Organization
2 Background
2.1 SPARKLE
2.2 Quantum Gates
2.3 Grover's Algorithm for Key Search
3 Quantum Implementation of SPARKLE
3.1 SPARKLE Permutation
3.2 SCHWAEMM
4 Performance
5 Cost Estimation for Grover Key Search
6 Conclusion
References
Network Security

Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming Algorithms
1 Introduction
2 Techniques for Poisoning 5G Beamforming Algorithms
3 A Reconfigurable Surface for Poisoning 5G Beamforming Algorithms
3.1 Reconfigurable Surface Modeling
3.2 Considered Beamforming Algorithms and Proposed Poisoning Algorithm
3.3 Physical Implementation and 5G Radio Channel Characteristics
4 Experimental Validation: Simulation and Results
5 Conclusions and Future Work
References

An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover
1 Introduction
2 Preliminaries
2.1 Definitions of Send/Echo Packets
2.2 Packet Crossover
2.3 The Distribution of Packets' RTTs in a Connection Chain
2.4 The Rationale to Detect SSI Based on the Length of a Connection Chain
3 Estimate the Length of a Downstream Connection Chain Using Packet Crossover
4 Network Experiments and Performance Analysis
5 Conclusion
References
Software-Defined Network Based Secure Internet-Enabled Video Surveillance System
1 Introduction

Browse Subjects

Show more subjects...

Statistics

from
to
Export