Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker
Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker
USF Tampa Graduate Theses and Dissertations
The advent of quantum computers and the exponential speed-up of quantum computation will render classical cryptosystems insecure, as that can solve current encryptions in minutes, resulting in a catastrophic failure of privacy preservation and data security. Through the standardizing of quantum-resistant public-key cryptography algorithms, the National Institute of Standards and Technology (NIST) is evaluating potential candidates to thwart such quantum attacks. In this dissertation, countermeasures against fault attacks are proposed to secure various lattice-based cryptosystems, one of the most promising post-quantum cryptosystems. Fault detection architectures for crucial building blocks of lattice-based cryptosystems, i.e., number-theoretic transform, ring polynomial multiplication, and ring …
Secure Vlsi Hardware Design Against Intellectual Property (Ip) Theft And Cryptographic Vulnerabilities, Matthew Dean Lewandowski
Secure Vlsi Hardware Design Against Intellectual Property (Ip) Theft And Cryptographic Vulnerabilities, Matthew Dean Lewandowski
USF Tampa Graduate Theses and Dissertations
Over the last two decades or so, VLSI hardware is increasingly subject to sophisticated attacks on both the supply chain and design fronts. There is no explicit trust that the manufacturers/providers are not producing counterfeit designs or that cryptographic algorithms we know to be secure in software are also secure in hardware. The novelty and key contributions of this work are as follows: 1) a continually refined method for Intellectual Property (IP) Protection that provides an approach for verification of IP ownership, 2) demonstrate how to break the PRESENT-80 cryptographic algorithm with significantly limited resources, and 3) provide a multitude …
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
USF Tampa Graduate Theses and Dissertations
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy
resources and also restricted by the ad-hoc network operational
environment. They pose unique challenges, due to limited power
supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …