BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality.
Robin Geelen+10 more
doaj +1 more source
Personal and family drama of Simka Katić in the novel Koreni by Dobrica Ćosić [PDF]
Through the fate of a novel's heroine Simka Katić, Serbian writer Dobrica Ćosić (1921-2014) showed the individual and collective fate of women in the Serbian society during the 19th century. The tragedy of this woman comes from her desire to give birth to the male heir for herself and for the family she was getting married into.
Anica M. Radosavljević+1 more
openaire +2 more sources
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling
In this paper we present a novel true random number generator based on high-precision edge sampling. We use two novel techniques to increase the throughput and reduce the area of the proposed randomness source: variable-precision phase encoding and ...
Bohan Yang+4 more
doaj +1 more source
M&M: Masks and Macs against Physical Attacks
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implementations must also withstand fault attacks and combined
Lauren De Meyer+4 more
doaj +1 more source
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas+4 more
doaj +1 more source
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera+3 more
doaj +1 more source
Cosic's Resonant Recognition Model for Macromolecules can be used to Predict and Modify the Fluctuating Wavelengths of Ultraweak Photon Emissions from Stressed Cancer Cells [PDF]
During the first 24 hours after removal from incubation cultured B16-BL6 mouse melanoma cells displayed reliable increases in ultraweak photon emission (UPE) of specific wavelengths during discrete time portions of this 24 hour interval. The application of specific filters demonstrated reliable and clear increases in UPE dependent upon the wavelength ...
openaire +2 more sources
Multiplicative Masking for AES in Hardware
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multiplicative way is more amenable for the computation of the
Lauren De Meyer+2 more
doaj +1 more source
My other car is your car: compromising the Tesla Model X keyless entry system
This paper documents a practical security evaluation of the Tesla Model X keyless entry system. In contrast to other works, the keyless entry system analysed in this paper employs secure symmetric-key and public-key cryptographic primitives implemented ...
Lennert Wouters+2 more
doaj +1 more source
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly+3 more
doaj +1 more source