Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016 (2016), Article ID 7920495, 10 pages
http://dx.doi.org/10.1155/2016/7920495
Research Article

An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One

1Mathematical Institute, Serbian Academy of Sciences and Arts, Kneza Mihaila 36, 11000 Belgrade, Serbia
2Department of Electrical Engineering, University of Hawaii, 2540 Dole Street, Honolulu, HI 96822, USA
3Institute of Industrial Science, University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan

Received 25 December 2015; Accepted 22 March 2016

Academic Editor: Veljko Milutinovic

Copyright © 2016 Miodrag J. Mihaljević et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. Ratković, N. Bežanić, O. S. Ünsal, A. Cristal, and V. Milutinović, “An overview of architecture-level power- and energy-efficient design techniques,” Advances in Computers, vol. 98, pp. 1–57, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. M. J. Mihaljević, “A framework for stream ciphers based on pseudorandomness, randomness and error-correcting coding,” in Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, B. Preneel, S. Dodunekov, V. Rijmen, and S. Nikova, Eds., vol. 23 of NATO Science for Peace and Security Series D: Information and Communication Security, pp. 117–139, IOS Press, Amsterdam, The Netherlands, 2009. View at Google Scholar
  3. M. J. Mihaljević and H. Imai, “An approach for stream ciphers design based on joint computing over random and secret data,” Computing, vol. 85, no. 1-2, pp. 153–168, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  4. M. J. Mihaljević, “An approach for light-weight encryption employing dedicated coding,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 892–898, Anaheim, Calif, USA, December 2012. View at Publisher · View at Google Scholar
  5. M. J. Mihaljević, “On certain coding approaches for security evaluation and design of stream ciphers,” Transaction on Advanced Research, vol. 8, no. 2, pp. 28–34, 2012. View at Google Scholar
  6. F. Oggier and M. J. Mihaljevic, “An information-theoretic security evaluation of a class of randomized encryption schemes,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, pp. 158–168, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. M. J. Mihaljević and K. Matsuura, “Evaluation of an approach for security enhancement of certain lightweight stream ciphers,” in Proceedings of the 32nd IEEE Symposium on Cryptography and Information Security (SCIS '15), Kokura, Japan, January 2015.
  8. A. Kavcic, M. J. Mihaljevic, and K. Matsuura, “Light-weight secrecy system using channels with insertion errors: cryptographic implications,” in Proceedings of the IEEE Information Theory Workshop (ITW '15), pp. 257–261, Jeju Island, South Korea, October 2015. View at Publisher · View at Google Scholar
  9. Y. Liron and M. Langberg, “A characterization of the number of subsequences obtained via the deletion channel,” IEEE Transactions on Information Theory, vol. 61, no. 5, pp. 2300–2312, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. J. Castiglione and A. Kavcic, “Trellis-based lower bounds on capacities of channels with synchronization errors,” in Proceedings of the IEEE Information Theory Workshop (ITW '15), pp. 11–15, Jeju Island, South Korea, October 2015. View at Publisher · View at Google Scholar
  11. J. Katz and Y. Lindell, Introduction to Modern Cryptography, CRC Press, Boca Raton, Fla, USA, 2007. View at MathSciNet
  12. D. L. Tebbe and S. J. Dwyer III, “Uncertainty and the probability of error,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 516–518, 1968. View at Google Scholar
  13. M. Feder and N. Merhav, “Relations between entropy and error probability,” IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 259–266, 1994. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  14. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  15. M. R. Bloch and J. N. Laneman, “Strong secrecy from channel resolvability,” IEEE Transactions on Information Theory, vol. 59, no. 12, pp. 8077–8098, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus