Results 11 to 20 of about 8,710 (316)

Multidimensional Linear Cryptanalysis of Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only.
Betül Aşkın Özdemir   +2 more
doaj   +1 more source

An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology.
Adriaan Peetermans, Ingrid Verbauwhede
doaj   +3 more sources

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality.
Robin Geelen   +10 more
doaj   +1 more source

Personal and family drama of Simka Katić in the novel Koreni by Dobrica Ćosić [PDF]

open access: yesЗборник радова Филозофског факултета у Приштини, 2020
Through the fate of a novel's heroine Simka Katić, Serbian writer Dobrica Ćosić (1921-2014) showed the individual and collective fate of women in the Serbian society during the 19th century. The tragedy of this woman comes from her desire to give birth to the male heir for herself and for the family she was getting married into.
Anica M. Radosavljević   +1 more
openaire   +2 more sources

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper we present a novel true random number generator based on high-precision edge sampling. We use two novel techniques to increase the throughput and reduce the area of the proposed randomness source: variable-precision phase encoding and ...
Bohan Yang   +4 more
doaj   +1 more source

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]

open access: yes, 2011
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph   +4 more
core   +3 more sources

An Investigation of How Wavelet Transform can Affect the Correlation Performance of Biomedical Signals : The Correlation of EEG and HRV Frequency Bands in the frontal lobe of the brain [PDF]

open access: yes, 2018
© 2018 by SCITEPRESS – Science and Technology Publications, Lda. All rights reservedRecently, the correlation between biomedical signals, such as electroencephalograms (EEG) and electrocardiograms (ECG) time series signals, has been analysed using the ...
Bhavsar, Ronakben   +3 more
core   +1 more source

M&M: Masks and Macs against Physical Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implementations must also withstand fault attacks and combined
Lauren De Meyer   +4 more
doaj   +1 more source

Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy