{ Banner Photo }

On the Security of Key Extraction from Measuring Physical Quantities

May 13, 2016
Matthew Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener
IEEE Transactions on Information Forensics and Security 11:8

Matthew Edman writes about the information-theoretic limits of a novel cryptographic method in wireless networks and presents a practical protocol for generating provably secure wireless encryption keys. He coauthored the paper with authors from Cornell University, Rensselaer Polytechnic Institute, and the University of Connecticut.

Read the abstract.

Related Professionals