Results 11 to 20 of about 2,921 (221)

Multidimensional Linear Cryptanalysis of Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only.
Betül Aşkın Özdemir   +2 more
doaj   +1 more source

Multiplicative Masking for AES in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multiplicative way is more amenable for the computation of the
Lauren De Meyer   +2 more
doaj   +1 more source

My other car is your car: compromising the Tesla Model X keyless entry system

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper documents a practical security evaluation of the Tesla Model X keyless entry system. In contrast to other works, the keyless entry system analysed in this paper employs secure symmetric-key and public-key cryptographic primitives implemented ...
Lennert Wouters   +2 more
doaj   +1 more source

M&M: Masks and Macs against Physical Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implementations must also withstand fault attacks and combined
Lauren De Meyer   +4 more
doaj   +1 more source

Cosic’s Resonance Recognition Model for Protein Sequences and Photon Emission Differentiates Lethal and Non-Lethal Ebola Strains: Implications for Treatment

open access: yesOpen Journal of Biophysics, 2015
The Cosic Resonance Recognition Model (RRM) for amino acid sequences was applied to the classes of proteins displayed by four strains (Sudan, Zaire, Reston, Ivory Coast) of Ebola virus that produced either high or minimal numbers of human fatalities. The results clearly differentiated highly lethal and non-lethal strains.
Nirosha J. Murugan   +2 more
openaire   +2 more sources

Rhythmic Keccak: SCA Security and Low Latency in HW

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas   +4 more
doaj   +1 more source

Cosic's Resonant Recognition Model for Macromolecules can be used to Predict and Modify the Fluctuating Wavelengths of Ultraweak Photon Emissions from Stressed Cancer Cells [PDF]

open access: yesBiophysical Journal, 2014
During the first 24 hours after removal from incubation cultured B16-BL6 mouse melanoma cells displayed reliable increases in ultraweak photon emission (UPE) of specific wavelengths during discrete time portions of this 24 hour interval. The application of specific filters demonstrated reliable and clear increases in UPE dependent upon the wavelength ...
openaire   +1 more source

Comparison of two social activities [PDF]

open access: yesSociološki Pregled, 2019
The work gives an analysis of the monograph Dobrica Ćosić between Politics and Literature written by Zoran Avramović, PhD. The first part presents the structure of the monograph and basic theoretical frameworks from which the author starts in his study ...
Košarac Biserka R.
doaj  

Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera   +3 more
doaj   +1 more source

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy