Search Results - "Philabaum, Christopher"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments by Cambou, Bertrand, Philabaum, Christopher, Hoffstein, Jeffrey, Herlihy, Maurice

    Published in Axioms (01-06-2023)
    “…The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that are directly using each digital file as a source of randomness…”
    Get full text
    Journal Article
  2. 2

    Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions by Cambou, Bertrand, Gowanlock, Michael, Yildiz, Bahattin, Ghanaimiandoab, Dina, Lee, Kaitlyn, Nelson, Stefan, Philabaum, Christopher, Stenberg, Alyssa, Wright, Jordan

    Published in Applied sciences (01-03-2021)
    “…Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of…”
    Get full text
    Journal Article
  3. 3

    Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions by Cambou, Bertrand, Gowanlock, Michael, Heynssens, Julie, Jain, Saloni, Philabaum, Christopher, Booher, Duane, Burke, Ian, Garrard, Jack, Telesca, Donald, Njilla, Laurent

    Published in Cryptography (01-06-2020)
    “…Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and…”
    Get full text
    Journal Article
  4. 4

    Resilient Password Manager Using Physical Unclonable Functions by Mohammadinodoushan, Mohammad, Cambou, Bertrand, Philabaum, Christopher Robert, Duan, Nan

    Published in IEEE access (2021)
    “…The offline dictionary attacks on the database of passwords (PW) or even hashed PW are damaging as a single server break-in leads to many compromised PWs. In…”
    Get full text
    Journal Article
  5. 5

    Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF by Mohammadinodoushan, Mohammad, Cambou, Bertrand, Afghah, Fatemeh, Philabaum, Christopher Robert, Burke, Ian

    Published in IEEE access (2021)
    “…Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW)…”
    Get full text
    Journal Article
  6. 6

    Enhancing Cryptographic Systems with Ternary-Based Methodologies and Physical Unclonable Functions by Philabaum, Christopher Robert

    Published 01-01-2022
    “…Historically, the practical use of ternary algebra has had limited success amongst the various fields of computer science. Likewise, in the past two decades…”
    Get full text
    Dissertation
  7. 7

    Can Ternary Computing Improve Information Assurance? by Cambou, Bertrand, Flikkema, Paul, Palmer, James, Telesca, Donald, Philabaum, Christopher

    Published in Cryptography (01-03-2018)
    “…Modern computer microarchitectures build on well-established foundations that have encouraged a pattern of computational homogeneity that many cyberattacks…”
    Get full text
    Journal Article
  8. 8

    A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices by Korenda, Ashwija Reddy, Afghah, Fatemeh, Cambou, Bertrand, Philabaum, Christopher

    “…This paper provides a proof of concept for using SRAM based Physically Unclonable Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized,…”
    Get full text
    Conference Proceeding
  9. 9

    Dynamic Key Generation for Polymorphic Encryption by Booher, D. Duane, Cambou, Bertrand, Carlson, Albert H., Philabaum, Christopher

    “…Frequency analysis can be effective in breaking block ciphers of very long messages encrypted with single keys, even when protected by cipher-block-chaining…”
    Get full text
    Conference Proceeding
  10. 10

    A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using GPGPU by Wright, Jordan, Fink, Zane, Gowanlock, Michael, Philabaum, Christopher, Donnelly, Brian, Cambou, Bertrand

    “…Many low-powered devices, such as those in the Internet of Things (IoT), require high levels of security. One shortfall of cryptographic systems is the storage…”
    Get full text
    Conference Proceeding
  11. 11

    A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices by Korenda, Ashwija Reddy, Afghah, Fatemeh, Cambou, Bertrand, Philabaum, Christopher

    Published 28-07-2019
    “…This paper provides a proof of concept for using SRAM based Physically Unclonable Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized,…”
    Get full text
    Journal Article
  12. 12

    Implementation of Password Management System Using Ternary Addressable PUF Generator by Mohammadinodoushan, Mohammad, Cambou, Bertrand, Philabaum, Christopher, Hely, David, Booher, D. Duane

    “…One of the crucial cyber-attacks which has been reported is hacking the databases of users' identification and passwords. Surprisingly, the typical procedure…”
    Get full text
    Conference Proceeding
  13. 13

    Public key exchange scheme that is addressable (PKA) by Habib, Bilal, Cambou, Bertrand, Booher, Duane, Philabaum, Christopher

    “…The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step…”
    Get full text
    Conference Proceeding