Key negotiation downgrade attacks on bluetooth and bluetooth low energy

D Antonioli, NO Tippenhauer… - ACM Transactions on …, 2020 - dl.acm.org
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies
specified in the Bluetooth standard. The standard includes key negotiation protocols used to …

Lightweight security data streaming, based on reconfigurable logic, for FPGA platform

M Tsavos, N Sklavos, GP Alexiou - 2020 23rd Euromicro …, 2020 - ieeexplore.ieee.org
Alongside the rapid expansion of Internet of Things (IoT), and network evolution (5G, 6G
technologies), comes the need for security of higher level and less hardware demanding …

Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy

K Rasmussen - ACM Trans. Priv. Secur., 2020 - cs.ox.ac.uk
Abstract Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless
technologies specified in the Bluetooth standard. The standard includes key negotiation …

Randomness Analysis of YUGAM-128 Using Diehard Test Suite

V Sriram, M Srikamakshi, KJ Jegadish Kumar… - … and Application: ICIDCA …, 2020 - Springer
The random key generation for the encryption/decryption process prevails as the significant
character of the stream ciphers. Here, we have introduced a novel idea to elucidate the …

[PDF][PDF] Randomness Analysis of YUGAM-128 Using Diehard Test Suite

KK Nagarajan - 2020 - researchgate.net
The random key generation for the encryption/decryption process prevails as the significant
character of the stream ciphers. Here, we have introduced a novel idea to elucidate the …

[PDF][PDF] Σχεδιασμός και υλοποίηση ενός εκπαιδευτικού ψηφιακού παιχνιδιού με θέμα το ολοκαύτωμα

ΑΙΠ Ταρενίδου - 2020 - ir.lib.uth.gr
Today's era is characterized by technological evolution and subsequent development. In an
age when technology is playing an increasingly important role in our lives, education needs …