Learn More
This paper presents the first formalization of partial key leakage security of a <i>two-pass</i> two-party authenticated key exchange (AKE) protocol on the extended Canetti-Krawczyk (eCK) security model. Our formalization, &#955;-leakage resilient eCK security, is a (stronger) generalization of the eCK security model with enhanced by the notion of(More)
We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is based on a physically unclonable function (PUF) and it is optimized for resource-constrained platforms. The reported results include a full protocol analysis, the(More)
The use of Physically Unclonable Functions (PUFs) in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailored to(More)
Coenzyme Q (CoQ) is composed of a benzoquinone moiety and an isoprenoid side chain of varying lengths. The length of the side chain is controlled by polyprenyl diphosphate synthase. In this study, dps1 genes encoding decaprenyl diphosphate synthase were cloned from three fungi: Bulleromyces albus, Saitoella complicata, and Rhodotorula minuta. The predicted(More)