Results 11 to 20 of about 7,182 (203)
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography.
Bernstein, D.J., Schwabe, P.
openaire +1 more source
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking.
Gaëtan Cassiers +4 more
doaj +1 more source
This paper develops the concept of a "crypto multiplier," which measures the equilibrium response of a cryptocurrency’s market capitalization to aggregate inflows and outflows of investors’ funds. The crypto multiplier takes high values when a large share of a cryptocurrency’s coins is held as an investment rather than being used as a means of payment.
Rodney J. Garratt +1 more
openaire +3 more sources
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security.
Gaëtan Cassiers +3 more
doaj +1 more source
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms
We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 and M3 devices.
Olivier Bronchain +1 more
doaj +1 more source
Study on the Implementation of Transactions with Virtual Currencies in the Fiscal Field [PDF]
Interest in virtual currencies has gained amplitude in recent years. According to recent estimates, made by a trading platform, the number of cryptocurrency users increased by more than 10 million, globally, between December 2020 and January 2021 ...
Mihai Aurelian IRIMIA +1 more
doaj +1 more source
On Leakage-Resilient Authenticated Encryption with Decryption Leakages
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient symmetric cryptographic primitives based on the minimal use of a leak-free component.
Francesco Berti +3 more
doaj +1 more source
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj +1 more source
MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING
El Gamal encryption was introduced in 1985 and is still commonly used today. Its hardness is based on a discrete logarithm problem defined over the finite abelian cyclic group group chosen in the original paper was but later it was proven that using the
Sa'aadah Sajjana Carita, Herman Kabetta
doaj +1 more source

