Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem. First, we show how to design cryptographic primitives which can assure integrity and confidentiality of transmitted messages while satisfying resource constrains of low-end low-cost wireless devices such as sensors or RFID tags. Second, we describe counter measures which can enhance the resistance of hardware implementing cryptographic algorithms to hardware Trojans
Abstract. Security has been proven a crucial factor in the provision of data services and especially...
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of ...
This dissertation examines the theoretical context for the security of wireless communication betwee...
Title from PDF of title page viewed June 30, 2020Dissertation advisor: Lein HarnIncludes bibliograph...
Ubiquitous computing describes the notion that computing devices will be everywhere: clothing, walls...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
International audienceThe design and implementation of security threat mitigation mechanisms in RFID...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequen...
Due to the numerous security and privacy risks, applications deployed in wireless networks require s...
Abstract. Security has been proven a crucial factor in the provision of data services and especially...
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of ...
This dissertation examines the theoretical context for the security of wireless communication betwee...
Title from PDF of title page viewed June 30, 2020Dissertation advisor: Lein HarnIncludes bibliograph...
Ubiquitous computing describes the notion that computing devices will be everywhere: clothing, walls...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
International audienceThe design and implementation of security threat mitigation mechanisms in RFID...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequen...
Due to the numerous security and privacy risks, applications deployed in wireless networks require s...
Abstract. Security has been proven a crucial factor in the provision of data services and especially...
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of ...
This dissertation examines the theoretical context for the security of wireless communication betwee...