Results 21 to 30 of about 336,920 (287)
Output-sensitive Information flow analysis [PDF]
Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more ...
Cristian Ene +2 more
doaj +1 more source
System-level Non-interference for Constant-time Cryptography [PDF]
International audienceCache-based attacks are a class of side-channel attacks that are particularly effective in virtualized or cloud-based en-vironments, where they have been used to recover secret keys from cryptographic implementations.
Aciiçmez O. +7 more
core +5 more sources
Finding Small and Large
Algorithms for triangle finding, the smallest nontrivial instance of the k-clique problem, have been proposed for quantum computers. Still, those algorithms assume the use of fixed access time quantum RAM.
Sara Ayman Metwalli +2 more
doaj +1 more source
An Efficient Speedup Strategy for Constant Sum Game Computations [PDF]
Large classes of game theoretic problems seem to defy attempts of finding polynomial-time al-gorithms while analyzing large amounts of data. This premise leads naturally to the possibility of using efficient parallel computing implementations when ...
Alexandru-Ioan STAN
doaj +1 more source
High performance and resource efficient FFT processor based on CORDIC algorithm
Fast Fourier Transform is widely used in communication and signal processing. I propose an improved multipath delay commutator pipelining architecture based on the radix-2 time decimation algorithm.
Yupu Zhao, Hong Lv, Jun Li, Lulu Zhu
doaj +1 more source
In this paper, we present nnAudio, a new neural network-based audio processing framework with graphics processing unit (GPU) support that leverages 1D convolutional neural networks to perform time domain to frequency domain conversion.
Kin Wai Cheuk +3 more
doaj +1 more source
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family are seeing a resurgence in popularity because of the recent result of Kim and Barbulescu that improves attacks against other pairing-friendly curve families.
Riad S. Wahby, Dan Boneh
doaj +1 more source
Worst case QC-MDPC decoder for McEliece cryptosystem [PDF]
McEliece encryption scheme which enjoys relatively small key sizes as well as a security reduction to hard problems of coding theory. Furthermore, it remains secure against a quantum adversary and is very well suited to low cost implementations on ...
Chaulet, Julia, Sendrier, Nicolas
core +4 more sources
Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks
Constant-time technique is of crucial importance to prevent secrets of cryptographic algorithms from leakage by cache attacks. In this paper, we propose Permute-Scatter-Gather, a novel constant-time method for the modular exponentiation that is used in ...
Youngjoo Shin
doaj +1 more source
In this paper, we present the first constant-time implementations of four-dimensional Gallant–Lambert–Vanstone and Galbraith–Lin–Scott (GLV-GLS) scalar multiplication using curve Ted 127 - glv 4 on 8-bit AVR, 16-bit ...
Jihoon Kwon +2 more
doaj +1 more source

