Results 41 to 50 of about 2,332 (255)

Consolidating Security Notions in Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer   +2 more
doaj   +1 more source

Time Sharing - A Novel Approach to Low-Latency Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
We present a novel approach to small area and low-latency first-order masking in hardware. The core idea is to separate the processing of shares in time in order to achieve non-completeness.
Dilip Kumar S. V.   +4 more
doaj   +1 more source

Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus

open access: yesIACR Transactions on Symmetric Cryptology, 2020
With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only between these devices and servers, but also the direct communication among these devices.
Tim Beyne   +3 more
doaj   +1 more source

Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Masking is one of the most prevalent and investigated countermeasures against side-channel analysis. As an alternative to the simple (e.g., additive) encoding function of Boolean masking, a collection of more algebraically complex masking types has ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

''Misija dobre volje''. Dobrica Ćosić na Drugom svesaveznom kongresu sovjetskih književnika (15-26. decembar 1954)

open access: yesIstorija 20. veka, 2019
The article reveals the events of Yugoslav-Soviet normalization of contacts in the cultural sphere in 1954-1955. It focuses on the participation of Dobrica Ćosić as a member of the delegation of Yugoslav writers in the work of the Second Congress of Soviet writers, held in Moscow in the second half of December 1954, which, as new documents now have ...
Andrej Borisovič Edemski   +1 more
openaire   +3 more sources

A Survey on Blockchain-Based IoMT Systems: Towards Scalability

open access: yesIEEE Access, 2021
Recently, blockchain-based Internet of Medical Things (IoMT) has started to receive more attention in the healthcare domain as it not only improves the care quality using real-time and continuous monitoring but also minimizes the cost of care.
Amirhossein Adavoudi Jolfaei   +2 more
doaj   +1 more source

Near‐Infrared‐II Absorbing Doubly N‐Confused Dioxo‐Heptaphyrins as Robust Photothermal Conversion Agents

open access: yesChemistry – An Asian Journal, EarlyView.
A new family of meso‐aryl‐substituted heptaphyrin analogs (1 and 1‐O2) containing two cisoid‐configured pyrrole units was successfully synthesized and characterized. The dioxo‐heptaphyrin 1‐O2 exhibits a figure‐of‐eight twisted structure, facilitating site‐selective metal coordination, which contributes to efficient photothermal conversion and ...
Kosuke Ito   +8 more
wiley   +1 more source

A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The reconfigurable physically unclonable function (PUF) is an advanced security hardware primitive, suitable for applications requiring key renewal or similar refresh functions.
Kai-Hsin Chuang   +5 more
doaj   +1 more source

An Autistic “Linguatype”? Neologisms, New Words, and New Insights

open access: yesAutism Research, EarlyView.
ABSTRACT In this commentary, we present new ideas about autistic neologisms. This essay has two primary goals. First, we argue that an autistic predilection to form neologisms generates intriguing new hypotheses about language in autism, including the possibility that a tendency to use neologisms could be a featural element of an autistic “linguatype” (
Emily Zane, Rhiannon J. Luyster
wiley   +1 more source

Advanced Characterization of Lithium‐Ion Battery Electrolytes Using Ultra‐high Resolution Mass Spectrometry and Nuclear Magnetic Resonance Spectroscopy

open access: yesBatteries &Supercaps, EarlyView.
Electricity storage is vital for the renewable energy transition, with lithium‐ion batteries (LIBs) as the leading technology. The LIB electrolyte composition determines their performance, lifespan, and charging capacity. Sensitive to water, LIB electrolytes require inert conditions for their analysis.
Julien Maillard   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy