Results 11 to 20 of about 7,182 (203)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

NEON Crypto [PDF]

open access: yes, 2012
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography.
Bernstein, D.J., Schwabe, P.
openaire   +1 more source

Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking.
Gaëtan Cassiers   +4 more
doaj   +1 more source

The Crypto Multiplier

open access: yesSSRN Electronic Journal, 2023
This paper develops the concept of a "crypto multiplier," which measures the equilibrium response of a cryptocurrency’s market capitalization to aggregate inflows and outflows of investors’ funds. The crypto multiplier takes high values when a large share of a cryptocurrency’s coins is held as an investment rather than being used as a means of payment.
Rodney J. Garratt   +1 more
openaire   +3 more sources

Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security.
Gaëtan Cassiers   +3 more
doaj   +1 more source

Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 and M3 devices.
Olivier Bronchain   +1 more
doaj   +1 more source

Study on the Implementation of Transactions with Virtual Currencies in the Fiscal Field [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics, 2023
Interest in virtual currencies has gained amplitude in recent years. According to recent estimates, made by a trading platform, the number of cryptocurrency users increased by more than 10 million, globally, between December 2020 and January 2021 ...
Mihai Aurelian IRIMIA   +1 more
doaj   +1 more source

On Leakage-Resilient Authenticated Encryption with Decryption Leakages

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient symmetric cryptographic primitives based on the minimal use of a leak-free component.
Francesco Berti   +3 more
doaj   +1 more source

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +1 more source

MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING

open access: yesBarekeng, 2022
El Gamal encryption was introduced in 1985 and is still commonly used today. Its hardness is based on a discrete logarithm problem defined over the finite abelian cyclic group group chosen in the original paper was but later it was proven that using the
Sa'aadah Sajjana Carita, Herman Kabetta
doaj   +1 more source

Home - About - Disclaimer - Privacy