Results 21 to 30 of about 336,808 (204)

Constant-time addition with hybrid-redundant numbers: Theory and implementations [PDF]

open access: yesIntegration, 2008
Hybrid-redundant number representation has provided a flexible framework for digit-parallel addition in a manner that facilitates area-time tradeoffs for VLSI implementations via arbitrary spacing of redundant digit positions within an otherwise nonredundant representation.
Ghassem Jaberipur, Behrooz Parhami
openaire   +1 more source

Using e-mail as performance feedback to teach paraprofessionals to implement constant time delay with braille words [PDF]

open access: yesBritish Journal of Visual Impairment, 2021
Equipping paraprofessionals to implement evidence-based instructional practices with fidelity can enhance the education of students with visual impairments. We used a multiple probe across participants design to evaluate the ability of paraprofessionals to follow constant time delay procedures with high fidelity when teaching braille words.
Carlie R. Rhoads, Erik W. Carter
openaire   +1 more source

Fast and simple constant-time hashing to the BLS12-381 elliptic curve

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family are seeing a resurgence in popularity because of the recent result of Kim and Barbulescu that improves attacks against other pairing-friendly curve families.
Riad S. Wahby, Dan Boneh
doaj   +1 more source

Modified Green's Functions for Shallow Water Acoustic Wave Propagation [PDF]

open access: yes, 2004
This article presents an assessment of alternative forms of the Green’s function for boundary element simulations of acoustic wave propagation in shallow water. It is assumed that the problem is two-dimensional, the source of acoustic disturbance is time-
Santiago, J A F S, Wrobel, L C
core   +1 more source

System-level Non-interference for Constant-time Cryptography [PDF]

open access: yes, 2014
International audienceCache-based attacks are a class of side-channel attacks that are particularly effective in virtualized or cloud-based en-vironments, where they have been used to recover secret keys from cryptographic implementations.
Aciiçmez O.   +7 more
core   +5 more sources

Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks

open access: yesApplied Sciences, 2018
Constant-time technique is of crucial importance to prevent secrets of cryptographic algorithms from leakage by cache attacks. In this paper, we propose Permute-Scatter-Gather, a novel constant-time method for the modular exponentiation that is used in ...
Youngjoo Shin
doaj   +1 more source

Efficient Implementations of Four-Dimensional GLV-GLS Scalar Multiplication on 8-Bit, 16-Bit, and 32-Bit Microcontrollers

open access: yesApplied Sciences, 2018
In this paper, we present the first constant-time implementations of four-dimensional Gallant–Lambert–Vanstone and Galbraith–Lin–Scott (GLV-GLS) scalar multiplication using curve Ted 127 - glv 4 on 8-bit AVR, 16-bit ...
Jihoon Kwon   +2 more
doaj   +1 more source

Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework

open access: yesEURASIP Journal on Information Security, 2017
The rapid increase in wired Internet speed and the constant growth in the number of attacks make network protection a challenge. Intrusion detection systems (IDSs) play a crucial role in discovering suspicious activities and also in preventing their ...
Monther Aldwairi   +2 more
doaj   +1 more source

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

open access: yesProceedings of the 17th International Conference on Availability, Reliability and Security, 2022
23 pages, 4 Figures, 7 ...
Marzougui, Soundes   +4 more
openaire   +3 more sources

Breaking Bad: How Compilers Break Constant-Time Implementations

open access: yesProceedings of the 20th ACM Asia Conference on Computer and Communications Security
The implementations of most hardened cryptographic libraries use defensive programming techniques for side-channel resistance. These techniques are usually specified as guidelines to developers on specific code patterns to use or avoid. Examples include performing arithmetic operations to choose between two variables instead of executing a secret ...
Schneider, Moritz; id_orcid0000-0002-8069-9848   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy