Results 31 to 40 of about 2,332 (255)

Analysis and Comparison of Table-based Arithmetic to Boolean Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck   +2 more
doaj   +1 more source

4,6‐O‐Phenylboronic Ester Protection for 1,2‐cis‐α‐Selective Glucosylation

open access: yesAsian Journal of Organic Chemistry, EarlyView.
The 4,6‐O‐phenylboronic ester protection for 1,2‐cis‐α‐selective glucosylation, previously reported by the Crich group, was revisited and the stereodirecting effect of the cyclic protecting group was unveiled. 4,6‐O‐Phenylboronic ester‐protected glucosyl and 2‐azido‐2‐deoxyglucosyl donors exhibited higher α‐selectivity of the glucosylation than the ...
Yuta Umemura   +6 more
wiley   +1 more source

Community music, identity and belonging among Dutchies in Australia: Comparing assimilation to multiculturalism

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract This article discusses variations in the experiences of Dutch identity and belonging to a music‐making group in the Dutch migrant community in Melbourne, Australia. It answers the research question “Which variations of ‘Dutch identity’ are there for the participants and how does music‐making relate to this?”. Feelings of identity and belonging
Karien Dekker   +2 more
wiley   +1 more source

Saber on ARM

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography standardization process.
Angshuman Karmakar   +3 more
doaj   +1 more source

A framework for cryptographic problems from linear algebra

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl   +3 more
doaj   +1 more source

Intellectual and literary engagement of Dobrica Ćosić in homeland [PDF]

open access: yesBastina, 2019
Dobrica chose for his life, literary refuge and activity in culture his homeland Ribrska Banja, Vrnjačka Banja, Kruševac and Velika Drenova. For the majority of his important literary oeuvres Dobrica Ćosić had literary workshops in Ribarska and Vrnjačka Banja.
openaire   +3 more sources

The Role of Electroencephalography in Predicting Post‐Stroke Seizures and an Updated Prognostic Model (SeLECT‐EEG)

open access: yesAnnals of Neurology, EarlyView.
Objective Seizures negatively impact stroke outcomes, highlighting the need for reliable predictors of post‐stroke epilepsy. Although acute symptomatic seizures are a known risk factor, most stroke survivors who develop epilepsy do not experience them.
Kai Michael Schubert   +12 more
wiley   +1 more source

Fast Transciphering Via Batched And Reconfigurable LUT Evaluation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fully homomorphic encryption provides a way to perform computations in a privacy preserving manner. However, despite years of optimization, modern methods may still be too computationally expensive for devices limited by speed or memory constraints.
Leonard Schild   +2 more
doaj   +1 more source

Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This work provides a critical review of the paper by Zaid et al. titled “Methodology for Efficient CNN Architectures in Profiling attacks”, which was published in TCHES Volume 2020, Issue 1.
Lennert Wouters   +3 more
doaj   +1 more source

Polynomial multiplication on embedded vector architectures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying structured lattice based cryptography. Its algorithmic properties and suitability for implementation on different compute platforms is an active area of ...
Hanno Becker   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy