Multidimensional Linear Cryptanalysis of Feistel Ciphers
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only.
Betül Aşkın Özdemir+2 more
doaj +1 more source
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology.
Adriaan Peetermans, Ingrid Verbauwhede
doaj +3 more sources
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj +1 more source
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality.
Robin Geelen+10 more
doaj +1 more source
Personal and family drama of Simka Katić in the novel Koreni by Dobrica Ćosić [PDF]
Through the fate of a novel's heroine Simka Katić, Serbian writer Dobrica Ćosić (1921-2014) showed the individual and collective fate of women in the Serbian society during the 19th century. The tragedy of this woman comes from her desire to give birth to the male heir for herself and for the family she was getting married into.
Anica M. Radosavljević+1 more
openaire +2 more sources
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling
In this paper we present a novel true random number generator based on high-precision edge sampling. We use two novel techniques to increase the throughput and reduce the area of the proposed randomness source: variable-precision phase encoding and ...
Bohan Yang+4 more
doaj +1 more source
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph+4 more
core +3 more sources
An Investigation of How Wavelet Transform can Affect the Correlation Performance of Biomedical Signals : The Correlation of EEG and HRV Frequency Bands in the frontal lobe of the brain [PDF]
© 2018 by SCITEPRESS – Science and Technology Publications, Lda. All rights reservedRecently, the correlation between biomedical signals, such as electroencephalograms (EEG) and electrocardiograms (ECG) time series signals, has been analysed using the ...
Bhavsar, Ronakben+3 more
core +1 more source
M&M: Masks and Macs against Physical Attacks
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implementations must also withstand fault attacks and combined
Lauren De Meyer+4 more
doaj +1 more source
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera+3 more
doaj +1 more source