Results 21 to 30 of about 597,383 (289)

Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if the attacker has full access to the execution environment. To obfuscate the round functions, Chow et al.
Yufeng Tang   +3 more
doaj   +1 more source

LPN-based Attacks in the White-box Setting

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks.
Alex Charlès, Aleksei Udovenko
doaj   +1 more source

scdNet: a computational tool for single-cell differential network analysis [PDF]

open access: yesBMC Systems Biology, 2018
Single-cell RNA sequencing (scRNA-Seq) is an emerging technology that has revolutionized the research of the tumor heterogeneity. However, the highly sparse data matrices generated by the technology have posed an obstacle to the analysis of differential gene regulatory networks.Addressing the challenges, this study presents, as far as we know, the ...
Chiu, Yu-Chiao   +4 more
openaire   +2 more sources

Fast Reachable Set Approximations via State Decoupling Disturbances

open access: yes, 2017
With the recent surge of interest in using robotics and automation for civil purposes, providing safety and performance guarantees has become extremely important.
Chen, Mo   +2 more
core   +1 more source

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough

open access: yes, 2016
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products. In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any ...
Bos, J.W.   +3 more
openaire   +4 more sources

Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers.
Yufeng Tang   +4 more
doaj   +1 more source

The cutoff method for the numerical computation of nonnegative solutions of parabolic PDEs with application to anisotropic diffusion and lubrication-type equations

open access: yes, 2013
The cutoff method, which cuts off the values of a function less than a given number, is studied for the numerical computation of nonnegative solutions of parabolic partial differential equations.
Alexander   +53 more
core   +1 more source

Improvement on a Masked White-Box Cryptographic Implementation

open access: yesIEEE Access, 2020
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj   +1 more source

Exact ZF Analysis and Computer-Algebra-Aided Evaluation in Rank-1 LoS Rician Fading [PDF]

open access: yes, 2016
We study zero-forcing detection (ZF) for multiple-input/multiple-output (MIMO) spatial multiplexing under transmit-correlated Rician fading for an N_R X N_T channel matrix with rank-1 line-of-sight (LoS) component.
Akimichi Takemura   +6 more
core   +1 more source

Analysis and Computation of the $\mathcal {H}_2$ Norm of Delay Differential Algebraic Equations [PDF]

open access: yesIEEE Transactions on Automatic Control, 2020
We consider a class of dynamical systems described by linear delay differential algebraic equations (DDAEs) called strangeness free, which is broader than the class commonly studied within the control theory field. Two problems arise in the study of the $\mathcal {H}_2$ norm of DDAEs: the first one is that it may be infinite even if the system is ...
Marco A. Gómez, Wim Michiels
openaire   +2 more sources

Home - About - Disclaimer - Privacy