Results 41 to 50 of about 7,182 (203)

Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Low-latency masked hardware implementations are known to be a difficult challenge. On the one hand, the propagation of glitches can falsify their independence assumption (that is required for security) and can only be stopped by registers.
Gaëtan Cassiers   +2 more
doaj   +1 more source

SPARK: A webserver for comprehensive search and analysis of testicular single‐cell transcriptomic data covering full lifecycle and pathology

open access: yesiMetaOmics, EarlyView.
SPARK is an interactive platform hosting 189,232 human testicular single‐cell transcriptomes across normal and infertile conditions. It enables automated, code‐free analysis and visualization, providing a powerful resource to explore cellular and molecular dynamics in male reproduction and infertility.
Lina Cui   +9 more
wiley   +1 more source

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti   +4 more
doaj   +1 more source

A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks.
Francesco Berti   +6 more
doaj   +1 more source

Taxonomic reappraisal of the mangrove genus Avicennia (Acanthaceae) in India

open access: yesNordic Journal of Botany, EarlyView.
A taxonomic reappraisal of the mangrove genus Avicennia in India was undertaken through extensive field surveys and critical examination of herbarium specimens. Three taxa, Avicennia alba, Avicennia marina subsp. marina, and Avicennia officinalis, are described in detail. A synonymic list was compiled using the World Checklist of Vascular Plants (WCVP)
Subrata Mondal, Saikat Naskar
wiley   +1 more source

Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
One important open question in side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security proofs.
Qian Guo   +3 more
doaj   +1 more source

Crypto-Book [PDF]

open access: yesProceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013
Through cross-site authentication schemes such as OAuth and OpenID, users increasingly rely on popular social networking sites for their digital identities--but use of these identities brings privacy and tracking risks. We propose Crypto-Book, an extension to existing digital identity infrastructures that offers privacy-preserving, digital identities ...
John Maheswaran   +2 more
openaire   +1 more source

Symbols of Climate Action: Audit Labor and the Production of Carbon Credits

open access: yesEconomic Anthropology, EarlyView.
ABSTRACT Voluntary carbon markets (VCMs) are promoted as tools for financing climate mitigation, yet their effectiveness and credibility remain contested. This article examines how carbon credits are produced and destabilized as symbols of climate action, emphasizing the forms of ecological and audit labor that sustain their legitimacy.
Diego Silva Garzón
wiley   +1 more source

Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new masked multiplication algorithm that satisfies a recently introduced notion called Probe-Isolating Non-Interference (PINI).
Gaëtan Cassiers   +1 more
doaj   +1 more source

Unnatural Causes: Cryptocurrencies, Carbon Credits, and the rise of Neoliberalism from Below

open access: yesEconomic Anthropology, EarlyView.
ABSTRACT Klima is a carbon‐backed cryptocurrency running as a decentralized autonomous organization (DAO). In 2021, it had accumulated 9 million metric tons of digital carbon credits and reached a market value of more than US$1 billion. In 2023, its treasury stored twice as many carbon credits, but its spot price was a tiny fraction compared to 2021 ...
Riccardo De Cristano, Alexander Paulsson
wiley   +1 more source

Home - About - Disclaimer - Privacy