Articles with "related functions" as a keyword



Photo by hudsoncrafted from unsplash

Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3214089

Abstract: This paper initiates the study of “Cryptophasia in Hardware” – a phenomenon that allows hardware circuits/devices with no pre-established secret keys to securely exchange secret information over insecure communication networks. The study of cryptophasia is… read more here.

Keywords: key exchange; physically related; exchange; related functions ... See more keywords
Photo from wikipedia

Commitments via Physically Related Functions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3243495

Abstract: Commitment schemes are one of the basic building blocks to construct secure protocols for multi party computation. Many recent works are exploring hardware primitives like physically unclonable functions to build keyless cryptographic protocols, with minimal… read more here.

Keywords: hardware; physically related; via physically; security ... See more keywords
Photo from wikipedia

Wound Healing-related Functions of the p160 Steroid Receptor Coactivator Family

Sign Up to like & get
recommendations!
Published in 2020 at "Endocrinology"

DOI: 10.1210/endocr/bqaa232

Abstract: Abstract Multicellular organisms have evolved sophisticated mechanisms to recover and maintain original tissue functions following injury. Injury responses require a robust transcriptomic response associated with cellular reprogramming involving complex gene expression programs critical for effective… read more here.

Keywords: wound healing; healing related; related functions; tissue ... See more keywords
Photo from wikipedia

Analysis of Key Storage Mechanism of Asymmetric Key-Related Functions in CNG Crypto Library

Sign Up to like & get
recommendations!
Published in 2023 at "Applied Sciences"

DOI: 10.3390/app13116510

Abstract: During the implementation of a crypto system, distributed cryptographic libraries are unable to endure situations where the execution environment rapidly changes because of a structural vulnerability that is by design. For this reason, Microsoft announced… read more here.

Keywords: key related; asymmetric key; key storage; storage mechanism ... See more keywords