Results 31 to 40 of about 2,332 (255)
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck+2 more
doaj +1 more source
4,6‐O‐Phenylboronic Ester Protection for 1,2‐cis‐α‐Selective Glucosylation
The 4,6‐O‐phenylboronic ester protection for 1,2‐cis‐α‐selective glucosylation, previously reported by the Crich group, was revisited and the stereodirecting effect of the cyclic protecting group was unveiled. 4,6‐O‐Phenylboronic ester‐protected glucosyl and 2‐azido‐2‐deoxyglucosyl donors exhibited higher α‐selectivity of the glucosylation than the ...
Yuta Umemura+6 more
wiley +1 more source
Abstract This article discusses variations in the experiences of Dutch identity and belonging to a music‐making group in the Dutch migrant community in Melbourne, Australia. It answers the research question “Which variations of ‘Dutch identity’ are there for the participants and how does music‐making relate to this?”. Feelings of identity and belonging
Karien Dekker+2 more
wiley +1 more source
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography standardization process.
Angshuman Karmakar+3 more
doaj +1 more source
A framework for cryptographic problems from linear algebra
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl+3 more
doaj +1 more source
Intellectual and literary engagement of Dobrica Ćosić in homeland [PDF]
Dobrica chose for his life, literary refuge and activity in culture his homeland Ribrska Banja, Vrnjačka Banja, Kruševac and Velika Drenova. For the majority of his important literary oeuvres Dobrica Ćosić had literary workshops in Ribarska and Vrnjačka Banja.
openaire +3 more sources
Objective Seizures negatively impact stroke outcomes, highlighting the need for reliable predictors of post‐stroke epilepsy. Although acute symptomatic seizures are a known risk factor, most stroke survivors who develop epilepsy do not experience them.
Kai Michael Schubert+12 more
wiley +1 more source
Fast Transciphering Via Batched And Reconfigurable LUT Evaluation
Fully homomorphic encryption provides a way to perform computations in a privacy preserving manner. However, despite years of optimization, modern methods may still be too computationally expensive for devices limited by speed or memory constraints.
Leonard Schild+2 more
doaj +1 more source
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks
This work provides a critical review of the paper by Zaid et al. titled “Methodology for Efficient CNN Architectures in Profiling attacks”, which was published in TCHES Volume 2020, Issue 1.
Lennert Wouters+3 more
doaj +1 more source
Polynomial multiplication on embedded vector architectures
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying structured lattice based cryptography. Its algorithmic properties and suitability for implementation on different compute platforms is an active area of ...
Hanno Becker+4 more
doaj +1 more source