Results 11 to 20 of about 10,420 (190)

Polynomial multiplication on embedded vector architectures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying structured lattice based cryptography. Its algorithmic properties and suitability for implementation on different compute platforms is an active area of ...
Hanno Becker   +4 more
doaj   +1 more source

TULP4, a novel E3 ligase gene, participates in neuronal migration as a candidate in schizophrenia

open access: yesCNS Neuroscience &Therapeutics, EarlyView., 2023
Mutations identified from four SCZ pedigrees resulted in decreased TULP4 expression. Tulp4 knockdown caused delayed neuron migration in embryonic mice, and impaired cognition and prepulse inhibition in adult mice. These phenotypes may be related to TULP4 through its involvement in the formation of a novel E3 ubiquitin ligases.
Yan Bi   +19 more
wiley   +1 more source

Analysis and Comparison of Table-based Arithmetic to Boolean Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck   +2 more
doaj   +1 more source

Oil and Vinegar: Modern Parameters and Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Two multivariate digital signature schemes, Rainbow and GeMSS, made it into the third round of the NIST PQC competition. However, neither made its way to being a standard due to devastating attacks (in one case by Beullens, the other by Tao, Petzoldt ...
Ward Beullens   +6 more
doaj   +1 more source

Exploring Cortex-M Microarchitectural Side Channel Information Leakage

open access: yesIEEE Access, 2021
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge
Alessandro Barenghi   +3 more
doaj   +1 more source

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

Secure HIGHT Implementation on ARM Processors

open access: yesMathematics, 2021
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including ...
Hwajeong Seo   +7 more
doaj   +1 more source

Implementation of Goertzel-based frequency estimation for power quality monitoring in embedded measurement systems [PDF]

open access: yesMetrology and Measurement Systems, 2022
International standards from IEC and IEEE regulate power grid parameters such as theRMSvalue, frequency, harmonic and interharmonic distortion, unbalance or the presence of transients, that are important to assure the quality of distributed power ...
Nuno M. Rodrigues   +2 more
doaj   +1 more source

Cortex-M4 optimizations for {R,M} LWE schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller.
Erdem Alkim   +3 more
doaj   +1 more source

A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]

open access: yes, 2018
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy