This thesis presents Algorithmic State Machine (ASM) designs that follow the One Cycle Demand Driven Convention (OCDDC) of three cryptographic protocols: Secure Distributed Multiplication (SDM), Pi Secure Distributed Multiplication (PiSDM, or secure distributed multiplication of a sequence), and Secure Comparison (SC), all of which achieve maximum throughput of 1/32, 1/(32(l - 1)), and 1/(32(l - 1)), respectively, for l-bit numbers. In addition, these protocols where implemented in VHDL and tested using ModelSim-Altera, verifying their correct functionality. Noting that the difference between a scheme and a protocol is that protocols involve message exchanging between two or more parties, to the author's knowledge, these hardware designs ar...
The aim of this thesis is to present and explore the results of a method for characterizing CMOS tra...
Hardware security mechanisms in uniprocessor and multiprocessor systems have been proposed to safegu...
A Provable Data Possession (PDP) scheme allows a client which has stored data at an untrusted server...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
This dissertation presents three new quantum key distribution protocols over a dual quantum-channel ...
Over the past four decades, computational power and algorithmic strategies have advanced tremendousl...
The secure and efficient operation of time-critical networks, such as vehicular networks, smart-grid...
In the vision for the 5G wireless communications advancement that yield new security prerequisites a...
The bandwidth and speed of network connections are continually increasing. The speed increase in net...
Micro aerial vehicles a.k.a. drones, have become an integral part of a variety of civilian and milit...
This research is concerned with distributed parallel processing and how a computer cluster/network m...
The future in how computing is done is heading in the direction of quantum computing given that the ...
Power side-channel attacks are a growing concern as they allow attackers to extract sensitive inform...
Sharing data with peers is an important functionality in cloud storage. This is a study and analysis...
The aim of this thesis is to present and explore the results of a method for characterizing CMOS tra...
Hardware security mechanisms in uniprocessor and multiprocessor systems have been proposed to safegu...
A Provable Data Possession (PDP) scheme allows a client which has stored data at an untrusted server...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
This dissertation presents three new quantum key distribution protocols over a dual quantum-channel ...
Over the past four decades, computational power and algorithmic strategies have advanced tremendousl...
The secure and efficient operation of time-critical networks, such as vehicular networks, smart-grid...
In the vision for the 5G wireless communications advancement that yield new security prerequisites a...
The bandwidth and speed of network connections are continually increasing. The speed increase in net...
Micro aerial vehicles a.k.a. drones, have become an integral part of a variety of civilian and milit...
This research is concerned with distributed parallel processing and how a computer cluster/network m...
The future in how computing is done is heading in the direction of quantum computing given that the ...
Power side-channel attacks are a growing concern as they allow attackers to extract sensitive inform...
Sharing data with peers is an important functionality in cloud storage. This is a study and analysis...
The aim of this thesis is to present and explore the results of a method for characterizing CMOS tra...
Hardware security mechanisms in uniprocessor and multiprocessor systems have been proposed to safegu...
A Provable Data Possession (PDP) scheme allows a client which has stored data at an untrusted server...