Results 31 to 40 of about 10,046 (210)
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo +2 more
doaj +3 more sources
SoK: SCA-secure ECC in software – mission impossible?
This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cortex-M4 microcontroller. For providing protections against various side-channel and fault attacks we first review known attacks and countermeasures, then ...
Lejla Batina +4 more
doaj +1 more source
Rehabilitative devices for a top-down approach [PDF]
In recent years, neurorehabilitation has moved from a "bottom-up" to a "top down" approach. This change has also involved the technological devices developed for motor and cognitive rehabilitation.
de Bartolo, Daniela +7 more
core +1 more source
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices [PDF]
This paper uses an Instruction Set Architecture(ISA) based statistical energy model of an ARM Cortex-M4microprocessor to evaluate the energy consumption of an implementation of AES with different side channel attack (SCA) countermeasures and an ...
Eder, Kerstin I +2 more
core +2 more sources
Computing with high-dimensional (HD) vectors, also referred to as $\textit{hypervectors}$, is a brain-inspired alternative to computing with scalars.
Benatti, Simone +4 more
core +1 more source
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Increasingly connectivity becomes integrated in products and devices that previously operated in a stand-alone setting. This observation holds for many consumer applications in the so-called "Internet of Things" (IoT) as well as for corresponding ...
Björn Haase, Benoît Labrique
doaj +1 more source
Improved triangular-based star pattern recognition algorithm for low-cost star trackers
Star identification algorithms based on triangular-pattern are more suitable for low-cost star trackers since they require less star density in the field of view to operate effectively.
Abderrahim Nabi +2 more
doaj +1 more source
Vitamin D interacts with Esr1 and Igf1 to regulate molecular pathways relevant to Alzheimer’s disease [PDF]
International audienceAbstractBackgroundIncreasing evidence suggests a potential therapeutic benefit of vitamin D supplementation against Alzheimer’s disease (AD). Although studies have shown improvements in cognitive performance and decreases in markers
Baranger, Kévin +4 more
core +11 more sources
ABSTRACT Background Schizophrenia is characterized by positive, negative, and cognitive symptoms. Current pharmacological treatments often fail to address cognitive deficits. In this review of clinical trials, we aim to identify studies that explore neurobiological (non‐psychological) strategies to address Cognitive Impairment Associated with ...
Bahareh Peyrovian +3 more
wiley +1 more source
There is tremendous potential in solar energy to meet future electricity demands. Partial shading (PS) and drift are two major problems that must be addressed simultaneously to achieve the maximum power point (MPP) of a stand-alone PV system, which are ...
Ashish Kumar Singhal +3 more
doaj +1 more source

