Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...