Search Results - "Philabaum, Christopher"
-
1
Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments
Published in Axioms (01-06-2023)“…The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that are directly using each digital file as a source of randomness…”
Get full text
Journal Article -
2
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Published in Applied sciences (01-03-2021)“…Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of…”
Get full text
Journal Article -
3
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
Published in Cryptography (01-06-2020)“…Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and…”
Get full text
Journal Article -
4
Resilient Password Manager Using Physical Unclonable Functions
Published in IEEE access (2021)“…The offline dictionary attacks on the database of passwords (PW) or even hashed PW are damaging as a single server break-in leads to many compromised PWs. In…”
Get full text
Journal Article -
5
Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF
Published in IEEE access (2021)“…Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW)…”
Get full text
Journal Article -
6
Enhancing Cryptographic Systems with Ternary-Based Methodologies and Physical Unclonable Functions
Published 01-01-2022“…Historically, the practical use of ternary algebra has had limited success amongst the various fields of computer science. Likewise, in the past two decades…”
Get full text
Dissertation -
7
Can Ternary Computing Improve Information Assurance?
Published in Cryptography (01-03-2018)“…Modern computer microarchitectures build on well-established foundations that have encouraged a pattern of computational homogeneity that many cyberattacks…”
Get full text
Journal Article -
8
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Published in 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (01-06-2019)“…This paper provides a proof of concept for using SRAM based Physically Unclonable Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized,…”
Get full text
Conference Proceeding -
9
Dynamic Key Generation for Polymorphic Encryption
Published in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (01-01-2019)“…Frequency analysis can be effective in breaking block ciphers of very long messages encrypted with single keys, even when protected by cipher-block-chaining…”
Get full text
Conference Proceeding -
10
A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using GPGPU
Published in 2021 IEEE Conference on Communications and Network Security (CNS) (04-10-2021)“…Many low-powered devices, such as those in the Internet of Things (IoT), require high levels of security. One shortfall of cryptographic systems is the storage…”
Get full text
Conference Proceeding -
11
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Published 28-07-2019“…This paper provides a proof of concept for using SRAM based Physically Unclonable Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized,…”
Get full text
Journal Article -
12
Implementation of Password Management System Using Ternary Addressable PUF Generator
Published in 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (01-06-2019)“…One of the crucial cyber-attacks which has been reported is hacking the databases of users' identification and passwords. Surprisingly, the typical procedure…”
Get full text
Conference Proceeding -
13
Public key exchange scheme that is addressable (PKA)
Published in 2017 IEEE Conference on Communications and Network Security (CNS) (01-10-2017)“…The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step…”
Get full text
Conference Proceeding