Skip to main content

Showing 1–8 of 8 results for author: Stahlbuhk, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.02499  [pdf, other

    cs.CR cs.IT

    An Efficient Hybrid Key Exchange Mechanism

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: We present \textsc{CHOKE}, a novel code-based hybrid key-encapsulation mechanism (KEM) designed to securely and efficiently transmit multiple session keys simultaneously. By encoding $n$ independent session keys with an individually secure linear code and encapsulating each resulting coded symbol using a separate KEM, \textsc{CHOKE} achieves computational individual security -- each key remains se… ▽ More

    Submitted 5 May, 2025; originally announced May 2025.

    Comments: 7 pages, 2 figures

  2. arXiv:2501.15076  [pdf, other

    cs.CR cs.IT cs.LG

    Cryptanalysis via Machine Learning Based Information Theoretic Metrics

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Muriel Médard

    Abstract: The fields of machine learning (ML) and cryptanalysis share an interestingly common objective of creating a function, based on a given set of inputs and outputs. However, the approaches and methods in doing so vary vastly between the two fields. In this paper, we explore integrating the knowledge from the ML domain to provide empirical evaluations of cryptosystems. Particularly, we utilize informa… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

  3. arXiv:2405.05107  [pdf, other

    cs.ET cs.AR eess.SY

    Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard

    Abstract: The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  4. arXiv:2309.08019  [pdf, other

    cs.CR cs.IT cs.LG

    CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Jongchan Woo, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography… ▽ More

    Submitted 18 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

  5. arXiv:2308.05063  [pdf, other

    cs.CR cs.AR cs.IT eess.SY

    CERMET: Coding for Energy Reduction with Multiple Encryption Techniques -- $It's\ easy\ being\ green$

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin Kim, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: This paper presents CERMET, an energy-efficient hardware architecture designed for hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction with network coding to provide both information-theoretic and computational security while reducing energy consumption per bit. This paper introduces the hardware architecture for the system and explores various optimizations to en… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  6. arXiv:2108.06409  [pdf, other

    cs.IT

    Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks

    Authors: Rafael G. L. D'Oliveira, Alejandro Cohen, John Robinson, Thomas Stahlbuhk, Muriel Médard

    Abstract: We consider the problem of post-quantum secure and ultra-reliable communication through a heterogeneous network consisting of multiple connections. Three performance metrics are considered: security, throughput, and in-order delivery delay. In this setting, previous work has looked, individually, at the trade-offs between in-order delivery delay and throughput, and between security and throughput.… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

  7. arXiv:2008.01528  [pdf, other

    cs.NI eess.SY

    Throughput Maximization in Uncooperative Spectrum Sharing Networks

    Authors: Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano

    Abstract: Throughput-optimal transmission scheduling in wireless networks has been a well considered problem in the literature, and the method for achieving optimality, MaxWeight scheduling, has been known for several decades. This algorithm achieves optimality by adaptively scheduling transmissions relative to each user's stochastic traffic demands. To implement the method, users must report their queue ba… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

    Comments: 15 pages, 7 figures

  8. arXiv:2005.05206  [pdf, other

    cs.PF cs.IT cs.LG eess.SY stat.ML

    Learning Algorithms for Minimizing Queue Length Regret

    Authors: Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano

    Abstract: We consider a system consisting of a single transmitter/receiver pair and $N$ channels over which they may communicate. Packets randomly arrive to the transmitter's queue and wait to be successfully sent to the receiver. The transmitter may attempt a frame transmission on one channel at a time, where each frame includes a packet if one is in the queue. For each channel, an attempted transmission i… ▽ More

    Submitted 14 May, 2020; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: 28 Pages, 11 figures