Results 21 to 30 of about 597,383 (289)
Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if the attacker has full access to the execution environment. To obfuscate the round functions, Chow et al.
Yufeng Tang +3 more
doaj +1 more source
LPN-based Attacks in the White-box Setting
In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks.
Alex Charlès, Aleksei Udovenko
doaj +1 more source
scdNet: a computational tool for single-cell differential network analysis [PDF]
Single-cell RNA sequencing (scRNA-Seq) is an emerging technology that has revolutionized the research of the tumor heterogeneity. However, the highly sparse data matrices generated by the technology have posed an obstacle to the analysis of differential gene regulatory networks.Addressing the challenges, this study presents, as far as we know, the ...
Chiu, Yu-Chiao +4 more
openaire +2 more sources
Fast Reachable Set Approximations via State Decoupling Disturbances
With the recent surge of interest in using robotics and automation for civil purposes, providing safety and performance guarantees has become extremely important.
Chen, Mo +2 more
core +1 more source
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products. In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any ...
Bos, J.W. +3 more
openaire +4 more sources
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers.
Yufeng Tang +4 more
doaj +1 more source
The cutoff method, which cuts off the values of a function less than a given number, is studied for the numerical computation of nonnegative solutions of parabolic partial differential equations.
Alexander +53 more
core +1 more source
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source
Exact ZF Analysis and Computer-Algebra-Aided Evaluation in Rank-1 LoS Rician Fading [PDF]
We study zero-forcing detection (ZF) for multiple-input/multiple-output (MIMO) spatial multiplexing under transmit-correlated Rician fading for an N_R X N_T channel matrix with rank-1 line-of-sight (LoS) component.
Akimichi Takemura +6 more
core +1 more source
Analysis and Computation of the $\mathcal {H}_2$ Norm of Delay Differential Algebraic Equations [PDF]
We consider a class of dynamical systems described by linear delay differential algebraic equations (DDAEs) called strangeness free, which is broader than the class commonly studied within the control theory field. Two problems arise in the study of the $\mathcal {H}_2$ norm of DDAEs: the first one is that it may be infinite even if the system is ...
Marco A. Gómez, Wim Michiels
openaire +2 more sources

