Results 161 to 170 of about 336,808 (204)
Some of the next articles are maybe not open access.
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long history of attacks and the availability of better options (e.g. AES-GCM). In this work, we present three new types of attack against four popular fully patched implementations of TLS (Amazon's s2n, GnuTLS, mbed TLS and wolfSSL) which elected to use "pseudo ...
Eyal Ronen +2 more
openaire +1 more source
Fast constant time implementations of ZUC-256 on x86 CPUs
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019ZUC-256 is a Pseudo Random Number Generator (PRNG) that is proposed as a successor of ZUC-128. Similarly to ZUC-128 that is incorporated in the 128-EEA3 and 128-EIA3 encryption and integrity algorithms, ZUC-256 is designed to offer 256-bit security and to be incorporated in the upcoming encryption and authentication algorithm in 5G technologies.
Nir Drucker, Shay Gueron
openaire +1 more source
A constant-time parallel sorting algorithm and its optical implementation
IEEE Micro, 1995High-speed electronic sorting networks are difficult to implement with VLSI technology because of the dense and global connectivity required. Optics eliminates this bottleneck by offering global interconnections, massive parallelism, and noninterfering communications.
A. Louri, J.A. Hatch, null Jongwhoa Na
openaire +1 more source
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
2018 International Conference on Field-Programmable Technology (FPT), 2018In this paper, we present a high-speed constant-time hardware implementation of NTRUEncrypt Short Vector Encryption Scheme (SVES), fully compliant with the IEEE 1363.1 Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
Farnoud Farahmand +3 more
openaire +1 more source
Learning to Effectively Implement Constant Time Delay Procedures to Teach Spelling
Learning Disability Quarterly, 2002This study examined the effectiveness of a training procedure designed to teach a special education resource teacher the constant time delay procedures. In addition, the study examined the effectiveness of constant time delay procedures in teaching written spelling words to one 12-year-old male student with a learning disability.
Trudie A. Hughes +2 more
openaire +1 more source
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
In this paper, we propose a constant-time implementation of the BLISS lattice-based signature scheme. BLISS is possibly the most efficient lattice-based signature scheme proposed so far, with a level of performance on par with widely used pre-quantum primitives like ECDSA.
Barthe, Gilles +5 more
openaire +2 more sources
In this paper, we propose a constant-time implementation of the BLISS lattice-based signature scheme. BLISS is possibly the most efficient lattice-based signature scheme proposed so far, with a level of performance on par with widely used pre-quantum primitives like ECDSA.
Barthe, Gilles +5 more
openaire +2 more sources
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 2021
We present the first side-channel attack on full-fledged smartphones that recovers the elliptic curve secret scalar from the electromagnetic signal that corresponds to a single scalar-by-point multiplication in current versions of Libgcrypt, OpenSSL, HACL* and curve25519-donna.
Alam, M. +7 more
openaire +2 more sources
We present the first side-channel attack on full-fledged smartphones that recovers the elliptic curve secret scalar from the electromagnetic signal that corresponds to a single scalar-by-point multiplication in current versions of Libgcrypt, OpenSSL, HACL* and curve25519-donna.
Alam, M. +7 more
openaire +2 more sources
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
2021This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptographic algorithm Streamlined NTRU Prime. We implement the entire KEM algorithm, including all steps for key generation, encapsulation and decapsulation, and all en- and decoding. We focus on optimizing the resources used, as well as applying optimization
openaire +1 more source
Efficacy of constant time delay implemented by peer tutors in general education classrooms
Journal of Behavioral Education, 1994We evaluated the effects of teaching 13 typically developing children to use constant time delay when tutoring three of their peers who had substantial disabilities. We measured the extent to which the tutors used the constant time delay procedure correctly and the tutees' correct performance on the skills being taught.
Mark Wolery +3 more
openaire +1 more source
SPIE Proceedings, 2016
Spatial Averaging Filters (SAF) are extensively used in image processing for image smoothing and denoising. Their latest implementations have already achieved constant time computational complexity regardless of kernel size. However, all the existing O(1) algorithms require additional memory for temporary data storage. In order to minimize memory usage
Gan, Qifeng +3 more
openaire +1 more source
Spatial Averaging Filters (SAF) are extensively used in image processing for image smoothing and denoising. Their latest implementations have already achieved constant time computational complexity regardless of kernel size. However, all the existing O(1) algorithms require additional memory for temporary data storage. In order to minimize memory usage
Gan, Qifeng +3 more
openaire +1 more source

