Results 21 to 30 of about 367,522 (306)

Transitional Leakage in Theory and Practice

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Accelerated by the increased interconnection of highly accessible devices, the demand for effective and efficient protection of hardware designs against Side-Channel Analysis (SCA) is ever rising, causing its topical relevance to remain immense in both,
Nicolai Müller   +3 more
doaj   +1 more source

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz   +9 more
doaj   +1 more source

Standard Lattice-Based Key Encapsulation on Embedded Devices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe   +3 more
doaj   +1 more source

Re-Consolidating First-Order Masking Schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Application of masking, known as the most robust and reliable countermeasure to side-channel analysis attacks, on various cryptographic algorithms has dedicated a lion’s share of research to itself.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj   +3 more sources

Inconsistency of Simulation and Practice in Delay-based Strong PUFs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate an ongoing struggle between designers and attackers. Such a combat motivated the atmosphere of open research, hence enhancing PUF designs in the presence of Machine ...
Anita Aghaie, Amir Moradi
doaj   +1 more source

Modified Hash to Obtain Random Subset-Tree (MHORST) Using Merkle Tree and Mersenne Twister

open access: yesJOIN: Jurnal Online Informatika
The development of quantum computing triggers new challenges in data security, particularly in addressing attacks that can solve complex mathematical problems on the fly.
Faidhil Nugrah Ramadhan Ahmad   +1 more
doaj   +1 more source

Prevalence and associated factors of strabismus in former preterm and full-term infants between 4 and 10 Years of age

open access: yesBMC Ophthalmology, 2017
Background Limited data exist collating most of the associated factors for strabismus in one analysis. The aim of this study was to assess the prevalence of strabismus and to analyse associated factors in former preterm and full-term infants.
Achim Fieß   +6 more
doaj   +1 more source

Shorter Linear Straight-Line Programs for MDS Matrices

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Most previous work concentrated on locally optimizing the multiplication with single matrix elements.
Thorsten Kranz   +3 more
doaj   +1 more source

Decision Framework for Predictive Maintenance Method Selection

open access: yesApplied Sciences, 2023
Many asset owners and maintainers have the ambition to better predict the future state of their equipment to make timely and better-informed maintenance decisions.
Wieger Tiddens   +2 more
doaj   +1 more source

Countermeasures against Static Power Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In recent years it has been demonstrated convincingly that the standby power of a CMOS chip reveals information about the internally stored and processed data.
Thorben Moos, Amir Moradi
doaj   +1 more source

Home - About - Disclaimer - Privacy