{"id":59,"date":"2023-04-17T22:53:25","date_gmt":"2023-04-17T22:53:25","guid":{"rendered":"https:\/\/nau.edu\/research\/?page_id=59"},"modified":"2024-05-13T15:19:02","modified_gmt":"2024-05-13T15:19:02","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"nau-block nau-block-left-nav-top-bound\">\n    \t<button id=\"left-nav-toggle-btn\" onclick=\"toggleNav();\">\n\t\tON THIS PAGE \n\t\t<i id=\"chevron-icon\" class=\"fas fa-solid fa-chevron-down\"><\/i>\n\t<\/button>\n\t<div id=\"left-nav-menu-track\">\n\t\t<div id=\"left-nav-wrapper\">\n\t\t\t<div class=\"rfi-above-anchor-tags\">\n\t\t\t\t<div class=\"ri-container\">\n\t\t\t\t\t<a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"left-nav-menu\">\n\t\t\t\t<div class=\"menu-section menu-section-links\"><h6 class=\"hidden-mobile left-nav-list-header\">ON THIS PAGE<\/h6><ul class=\"left-nav-menu-list left-nav-automatic on-this-page\"><\/ul><div class=\"ri-container\"><a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a><\/div><\/div>\t\t\t\t\t\t\t\t<div class=\"menu-section backcolor\">\n\t\t\t\t\t<div class=\"header\">\n\t\t\t\t\t\tHOW CAN WE HELP?\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"responsive-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"tel:928-523-4620\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-phone.svg\" alt=\"Telephone:\"> 928-523-4620<\/a>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"mailto:nauinnovations@nau.edu\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-email.svg\" alt=\"Email:\"><span class=\"left-nav-email\"> nauinnovations&#8203;@nau.edu <\/span><\/a><\/li>\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section class=\"nau-block left-nav-section\"><header class=\"entry-header\"><div class=\"breadcrumb\"><ol class=\"breadcrumbs\"><li><a href=\"https:\/\/in.nau.edu\">IN<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li><a href=\"https:\/\/in.nau.edu\/research\">Research<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li class=\"current\">Pages<\/li><\/ol><\/div><h1 class=\"entry-title text-left \">Cybersecurity<\/h1><hr class=\"h1-hr  text-left \" role=\"none\"><\/header><!-- .entry-header --><\/section><!-- <section class=\"nau-block left-nav-section grid-md-12\">\n    <header class=\"entry-header\">\n        <h1 class=\"entry-title text-left \" tabindex=\"0\" id=\"h1-first\">Dummy H1<\/h1>\n        <hr class=\"h1-hr  text-left \" role=\"none\">\n    <\/header>\n<\/section> -->\n\n<section class=\"nau-block left-nav-section grid-md-12\">\n    <div class=\"page-content\">\n        \n\n<h2 class=\"wp-block-heading\">Quantum key distribution<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/quantum-ternary-key-distribution\/\">Quantum Ternary Key Distribution<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/strengthening-quantum-key-distribution\/\">Strengthening Quantum Key Distribution with Addressable Physically Unclonable Functions (PUFs) and Ternary States<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/multi-state-quantum-key-distribution\/\">Secure Multi-State Quantum Key Distribution With Wavelength-Division Multiplexing<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Encryption schemes<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/keyless-encryption-schemes\/\">Keyless Encryption Schemes with Addressable Physically Unclonable Functions (PUFs)<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/cryptographic-schemes-with-multiple-hashing\/\">Physically Unclonable Function (PUF)-Based Key Generation for Cryptographic Schemes with Multiple Hashing of Private Keys<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/encryption-schemes-with-combination-of-hashing-methods\/\">Physically Unclonable Function (PUF)-Base Encryption Schemes with Combination of Hashing Methods<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/encoding-ternary-data\/\">Encoding Ternary Data for Physically Unclonable Function (PUF) Environments<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/encryption-schemes-with-addressable-elements\/\">Encryption Schemes with Addressable Elements<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Password management and authentication<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/authentication-of-images-extracted-from-unclonable-objects\/\">Authentication of Images Extracted from Unclonable Objects<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/password-management\/\">Password Management with Addressable Physically Unclonable Function (PUF) Generators<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/physically-unclonable-function-puf-based-password-generation-scheme\/\">Physically Unclonable Function (PUF)-Based Password Generation Scheme<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/hardware-arrangement-for-increased-throughput\/\">Physically Unclonable Function (PUF) Hardware Arrangement for Increased Throughput<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/resilient-password-management-system\/\">Resilient Password Management System Using an Array of Addressable Physically Unclonable Functions (PUFs)<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/securing-distributed-elements\/\">Securing Distributed Elements Connected to a Network with Addressable Physically Unclonable Functions (PUFs)<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/systems-implementing-hierarchical-levels-of-security\/\">Systems Implementing Hierarchical Levels of Security<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Blockchain applications<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/digital-signature-for-blockchains\">Digital Signature for Blockchains with Ternary Physical Unclonable Functions (PUFs)<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Key generation and key exchange<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/cell-pairing-for-cryptographic-keys\">Cell Pairing for Cryptographic Keys Generation from Memristors at Low Power<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/generation-of-keys-with-variable-length\/\">Generation of Keys with Variable Length (KVL) from Cryptographic Tables<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/generation-of-composite-private-keys\/\">Generation of Composite Private Keys<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/key-exchange-schemes\/\">Key Exchange Schemes with Addressable Elements<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/methods-for-fast-cryptographic-key-generation\/\">Methods for Fast Cryptographic Key Generation from Memristor-Based Physically Unclonable Computed Functions (PUFs)<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/puf-based-key-generation-for-lattice-and-code-cryptography\/\">PUF-Based Key Generation for Lattice and Code Cryptography<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/puf-protected-pseudo-homomorphic-methods\/\">PUF-Protected Pseudo-Homomorphic Methods to Generate Session Keys<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/response-based-cryptography\/\">Response-Based Cryptography with Physically Unclonable Functions (PUFs)<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/salted-hashing-protocol\/\">Salted Hashing Protocol for Response-Based Cryptography<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/securing-physically-unclonable-functions\/\">Securing Physically Unclonable Functions (PUFs) with Additional Random Ternary States<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/unequally-powered-cryptography\/\">Unequally Powered Cryptography with Physically Unclonable Functions (PUFs)<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cryptographic primitive generators<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/random-number-generating-systems-with-ternary-states\/\">Random Number Generating Systems with Ternary States<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/physical-unclonable-functions-pufs\/\">Physical Unclonable Functions (PUFs) with Memories Containing Ternary States<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/data-compiler-for-true-random-number-generation\/\">Data Compiler for True Random Number Generation and Related Methods<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/multi-physically-unclonable-function-puf\/\">Multi-Physically Unclonable Function (PUF) Authentication from Sensors and their Calibration<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/native-ternary-random-numbers-generation\/\">Native Ternary Random Numbers Generation<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/nanomaterial-physical-unclonable-functions\/\">Nanomaterial Physically Unclonable Function (PUF) for Fiber-Optic Communication<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/true-random-number-generation\/\">True Random Number Generation from Pre-Formed ReRAM Arrays<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Physically Unclonable Function (PUF) and system design with memristors\/dissolvable paths<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/puf-with-dissolvable-conductive-paths\/\">Physically Unclonable Function (PUF) with Dissolvable Conductive Paths<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/artificial-neuron-synaptic-weights\">Artificial Neuron Synaptic Weights Implemented with Variable Dissolvable Conductive Paths<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/methods-for-fast-cryptographic-key-generation\/\">Methods for Fast Cryptographic Key Generation from Memristor-Based Physically Unclonable Computed Functions (PUFs)<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Miscellaneous<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/dynamic-hybridized-positional-notation-instruction\/\">Dynamic Hybridized Positional Notation Instruction Set Computer Architecture to Enhance Security<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/error-correcting-schemes-for-keyless-encapsulation\/\">Error Correcting Schemes for Keyless Encapsulation<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/methods-for-authenticating-unclonable-optical-tags\/\">Methods for Authenticating Unclonable Optical Tags to Mitigate Counterfeit and Cloning Attacks<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/multi-functional-units-for-ternary-computing\/\">Multi-Functional Units for Ternary Computing<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/secure-enrollment-for-physical-unclonable-functions-pufs\/\">Secure Enrollment for Physical Unclonable Functions (PUFs)<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/sensing-scheme-for-low-power-reram-based-puf\/\">Sensing Scheme for Low Power ReRAM-based PUF<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/system-and-method-for-active-cyberattack-defense\/\">System and Method for Active Cyberattack Defense<\/a><\/li><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/physical-unclonable-functions-pufs-to-secure-data-detect-corruption\/\">Physical Unclonable Functions (PUFs) to Secure Data and Detect Corruption<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Multi-state computing<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/multi-state-physical-unclonable-functions\/\">Multi-State Unclonable Functions with Machine Learning<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Software and hardware<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/systems-and-methods-for-differentiable-programming-for-hyperspectral-unmixing\/\">Systems and Methods for Differentiable Programming for Hyperspectral Unmixing<\/a><\/li><\/ul>\n\n\n    <\/div>\n<\/section>\n\n<div class=\"nau-block nau-block-left-nav-bottom-bound\">\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":76,"featured_media":1528,"parent":42,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-59","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":91,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59\/revisions"}],"predecessor-version":[{"id":5791,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59\/revisions\/5791"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/42"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media\/1528"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media?parent=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}