Results 1 to 10 of about 2,921 (221)

Dobrica Cosic and Kosovo issue opening in 1968 [PDF]

open access: yesBaština, 2012
At the beginning of the sixties, Yugoslavia entered the period of relative foreign policy safety. Stable international position enabled introduction of questions of internal reforms. After the conflict at the political top, the current confederation gained victory, under which influence economic and administrative reform started.
Ristanović Petar
openaire   +1 more source

Correction to: Knowledge of the Culture of Safety in Cholecystectomy (COSIC) Among Surgical Residents: Do We Train Them Well For Future Practice? [PDF]

open access: yesWorld Journal of Surgery, 2021
An amendment to this paper has been published and can be accessed via the original article.
Vishal Gupta   +4 more
openaire   +1 more source

StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe   +2 more
doaj   +1 more source

Integral Cryptanalysis Using Algebraic Transition Matrices

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016).
Tim Beyne, Michiel Verbauwhede
doaj   +1 more source

Novel Cosic resonance (standing wave) solutions for components of the JAK–STAT cellular signaling pathway: A convergence of spectral density profiles [PDF]

open access: yesFEBS Open Bio, 2015
Cosic discovered that spectral analyses of a protein sequence after each constituent amino acid had been transformed into an appropriate pseudopotential predicted a resonant energy between interacting molecules. Several experimental studies have verified the predicted peak wavelength of photons within the visible or near‐visible light band for specific
Lukasz M. Karbowski   +2 more
openaire   +3 more sources

Cryptanalysis of Strong Physically Unclonable Functions

open access: yesIEEE Open Journal of the Solid-State Circuits Society, 2023
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently store secret keys or provide device authentication without requiring nonvolatile memory, large e-fuses, or other dedicated processing steps.
Liliya Kraleva   +5 more
doaj   +1 more source

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology.
Adriaan Peetermans, Ingrid Verbauwhede
doaj   +3 more sources

BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality.
Robin Geelen   +10 more
doaj   +1 more source

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper we present a novel true random number generator based on high-precision edge sampling. We use two novel techniques to increase the throughput and reduce the area of the proposed randomness source: variable-precision phase encoding and ...
Bohan Yang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy