A maximum entropy approach to natural language processing
Computational Linguistics
Inducing Features of Random Fields
IEEE Transactions on Pattern Analysis and Machine Intelligence
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
An Introduction to Cryptography
An Introduction to Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
RSA and Public-Key Cryptography
RSA and Public-Key Cryptography
Vehicle Velocity Estimation Based on RSS Measurements
Wireless Personal Communications: An International Journal
Detecting anomalies in network traffic using maximum entropy estimation
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
LTE, The UMTS Long Term Evolution: From Theory to Practice
LTE, The UMTS Long Term Evolution: From Theory to Practice
On ML estimation for automatic RSS-based indoor localization
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Relative location estimation in wireless sensor networks
IEEE Transactions on Signal Processing
Matching pursuits with time-frequency dictionaries
IEEE Transactions on Signal Processing
Hi-index | 0.00 |
In this paper the feasibility of an alternative approach to construct stream ciphers is discussed by revisiting an old friend, i.e. the popular one-time pad. The idea is that the rationale underlying the one-time pad--which is notoriously unpractical in pure form due to the need of massive secret key exchange--might be translated into practical cryptosystems that are different from conventional stream ciphers. In alternative to the usual pseudo-random keystream generation approach (expansion), a "dual" approach based on sampling of a much longer sequence (extraction) could be conceivable nowadays due to the ready availability of sufficiently large memory resources, even in mobile devices such as PDAs, smartphones and tablets. The paper presents this idea, analyzing its pros and cons versus the classical one-time pad and conventional stream ciphers. Some practical systems that could implement the extraction paradigm are also envisioned. Finally, it is presented a real prototype of a IEEE 802.15.4-based wireless network, developed in software-defined radio by means of the GNU Radio/USRP framework, where nodes can exchange packets with virtually perfect secrecy without requiring a private pad dissemination.