Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Chamon, Christiana"'
Autor:
Flanery, Sarah A., Chamon, Christiana
This paper introduces a three-point biometric authentication system for a blockchain-based decentralized identity network. We use existing biometric authentication systems to demonstrate the unique noise fingerprints that belong to each individual hu
Externí odkaz:
http://arxiv.org/abs/2409.04931
Cybersecurity practices require effort to be maintained, and one weakness is a lack of awareness regarding potential attacks not only in the usage of machine learning models, but also in their development process. Previous studies have determined tha
Externí odkaz:
http://arxiv.org/abs/2408.07513
This paper presents a statistical physical generation of random keys for a decentralized identity ecosystem that uses Web 3.0 protocols. Web 3.0 is driven by secure keys, typically represented in hexadecimal, that are pseudo-randomly generated by an
Externí odkaz:
http://arxiv.org/abs/2312.17113
Autor:
Flanery, Sarah A., Mohanasundar, Kamalesh, Chamon, Christiana, Kotikela, Srujan D., Quek, Francis K.
With the natural evolution of the web, the need for decentralization has rendered the current centralized education system out of date. The student does not "own" their credentials, as the only way their accomplishments are directly linked to their p
Externí odkaz:
http://arxiv.org/abs/2312.12268
In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- Kirchhoff-Law-Johnson-Noise (KLJN) Key Exchanger (Nature, Science Report 5 (2015) 13653) against two active attacks is demonstrated. The security vulnerability arises from the fa
Externí odkaz:
http://arxiv.org/abs/2210.05121
Autor:
Chamon, Christiana
This dissertation demonstrates three new types of attacks against the KLJN scheme. The first attack type is based on compromised RNGs. The first RNG attacks are deterministic. First, Eve knows both noises. She can crack the bit via Ohm's Law and one-
Externí odkaz:
http://arxiv.org/abs/2112.09052
This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generators at Alice's/Bob's site(s). The case of partial corr
Externí odkaz:
http://arxiv.org/abs/2110.03088
Autor:
Chamon, Christiana, Kish, Laszlo B.
This paper introduces a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attack is based on the nonlinearity of the noise generators. We explore the effect of total distortion (TD) at the second order (D2), th
Externí odkaz:
http://arxiv.org/abs/2108.09370
Autor:
Chamon, Christiana, Kish, Laszlo
A secure key distribution (exchange) scheme is unconditionally secure if it is unbreakable against arbitrary technological improvements of computing power and/or any development of new algorithms. There are only two families of experimentally realize
Externí odkaz:
http://arxiv.org/abs/2105.12592
This paper demonstrates the vulnerability of the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchanger to compromised random number generator(s) even if these random numbers are used solely to generate the noises emulating the Johnson noise of Alic
Externí odkaz:
http://arxiv.org/abs/2012.02848