Results 11 to 20 of about 10,420 (190)
Polynomial multiplication on embedded vector architectures
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying structured lattice based cryptography. Its algorithmic properties and suitability for implementation on different compute platforms is an active area of ...
Hanno Becker +4 more
doaj +1 more source
TULP4, a novel E3 ligase gene, participates in neuronal migration as a candidate in schizophrenia
Mutations identified from four SCZ pedigrees resulted in decreased TULP4 expression. Tulp4 knockdown caused delayed neuron migration in embryonic mice, and impaired cognition and prepulse inhibition in adult mice. These phenotypes may be related to TULP4 through its involvement in the formation of a novel E3 ubiquitin ligases.
Yan Bi +19 more
wiley +1 more source
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck +2 more
doaj +1 more source
Oil and Vinegar: Modern Parameters and Implementations
Two multivariate digital signature schemes, Rainbow and GeMSS, made it into the third round of the NIST PQC competition. However, neither made its way to being a standard due to devastating attacks (in one case by Beullens, the other by Tao, Petzoldt ...
Ward Beullens +6 more
doaj +1 more source
Exploring Cortex-M Microarchitectural Side Channel Information Leakage
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge
Alessandro Barenghi +3 more
doaj +1 more source
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj +1 more source
Secure HIGHT Implementation on ARM Processors
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including ...
Hwajeong Seo +7 more
doaj +1 more source
Implementation of Goertzel-based frequency estimation for power quality monitoring in embedded measurement systems [PDF]
International standards from IEC and IEEE regulate power grid parameters such as theRMSvalue, frequency, harmonic and interharmonic distortion, unbalance or the presence of transients, that are important to assure the quality of distributed power ...
Nuno M. Rodrigues +2 more
doaj +1 more source
Cortex-M4 optimizations for {R,M} LWE schemes
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller.
Erdem Alkim +3 more
doaj +1 more source
A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier +3 more
core +1 more source

