@inproceedings{3d5be8ca3da04e36b48b55811d4e1e4d,
title = "Ternary computing to strengthen cybersecurity: Development of ternary state based public key exchange",
abstract = "In this key exchange scheme for a public key infrastructure, the initialization step or “personalization” is based on the secure exchange of addressable cryptographic tables between the communicating parties. The content of these tables is generated either with ternary random numbers, or with arrays of addressable physical unclonable functions having ternary states, which we are generating with memristors. Private keys are generated independently with the shared public keys by all communicating parties, with their ternary cryptographic tables. Public and private key pairs, which are used for authentication and cryptography, are binary streams while the core of the scheme is based on ternary logic. The communication between parties can occur over untrusted channels, by exchanging dynamically generated public keys, and using legacy binary codes. The ternary computing environment largely enhances entropy, and creates additional levels of cybersecurity.",
keywords = "Authentication, Cryptography, Cybersecurity, Memristors, Physical unclonable function, Public key infrastructure, Ternary computing, Ternary logic states",
author = "Bertrand Cambou and Donald Telesca",
note = "Publisher Copyright: {\textcopyright} Springer Nature Switzerland AG 2019.; Computing Conference, 2018 ; Conference date: 10-07-2018 Through 12-07-2018",
year = "2019",
doi = "10.1007/978-3-030-01177-2_67",
language = "English (US)",
isbn = "9783030011765",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer-Verlag",
pages = "898--919",
editor = "Supriya Kapoor and Rahul Bhatia and Kohei Arai",
booktitle = "Intelligent Computing - Proceedings of the 2018 Computing Conference",
}