Search
Now showing items 1-7 of 7
Designing a Block Cipher in Galois Extension Fields for IoT Security
(MDPI, 2021-11-05)
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ...
Cyberphysical Security Through Resiliency: A Systems-Centric Approach
(2021-06)
Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ...
Attacks and Defenses for Single-Stage Residue Number System PRNGs
(MDPI, 2021-06-25)
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ...
An ontological metamodel for cyber-physical system safety, security, and resilience coengineering
(2021-06-01)
Cyber-physical systems are complex systems that require the integration of diverse software, firmware, and hardware to be practical and useful. This increased complexity is impacting the management of models necessary for ...
Real-Time Mask Recognition
(MDPI, 2021-11-08)
While a variety of image processing studies have been performed to quantify the potential performance of neural network-based models using high-quality still images, relatively few studies seek to apply those models to a ...
Shannon Entropy Loss in Mixed-Radix Conversions
(MDPI, 2021-07-27)
This paper models a translation for base-2 pseudorandom number generators (PRNGs) to mixed-radix uses such as card shuffling. In particular, we explore a shuffler algorithm that relies on a sequence of uniformly distributed ...
Enabling Artificial Intelligence Adoption through Assurance
(MDPI, 2021-08-25)
The wide scale adoption of Artificial Intelligence (AI) will require that AI engineers and developers can provide assurances to the user base that an algorithm will perform as intended and without failure. Assurance is the ...