Dobrica Cosic and Kosovo issue opening in 1968 [PDF]
At the beginning of the sixties, Yugoslavia entered the period of relative foreign policy safety. Stable international position enabled introduction of questions of internal reforms. After the conflict at the political top, the current confederation gained victory, under which influence economic and administrative reform started.
Ristanović Petar
openaire +1 more source
Correction to: Knowledge of the Culture of Safety in Cholecystectomy (COSIC) Among Surgical Residents: Do We Train Them Well For Future Practice? [PDF]
An amendment to this paper has been published and can be accessed via the original article.
Vishal Gupta +4 more
openaire +1 more source
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe +2 more
doaj +1 more source
Integral Cryptanalysis Using Algebraic Transition Matrices
In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016).
Tim Beyne, Michiel Verbauwhede
doaj +1 more source
Novel Cosic resonance (standing wave) solutions for components of the JAK–STAT cellular signaling pathway: A convergence of spectral density profiles [PDF]
Cosic discovered that spectral analyses of a protein sequence after each constituent amino acid had been transformed into an appropriate pseudopotential predicted a resonant energy between interacting molecules. Several experimental studies have verified the predicted peak wavelength of photons within the visible or near‐visible light band for specific
Lukasz M. Karbowski +2 more
openaire +3 more sources
Cryptanalysis of Strong Physically Unclonable Functions
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently store secret keys or provide device authentication without requiring nonvolatile memory, large e-fuses, or other dedicated processing steps.
Liliya Kraleva +5 more
doaj +1 more source
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj +1 more source
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology.
Adriaan Peetermans, Ingrid Verbauwhede
doaj +3 more sources
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality.
Robin Geelen +10 more
doaj +1 more source
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling
In this paper we present a novel true random number generator based on high-precision edge sampling. We use two novel techniques to increase the throughput and reduce the area of the proposed randomness source: variable-precision phase encoding and ...
Bohan Yang +4 more
doaj +1 more source

