Results 101 to 110 of about 2,808 (186)
3-Share Threshold Implementation of AES S-box without Fresh Randomness
Threshold implementation is studied as a countermeasure against sidechannel attack. There had been no threshold implementation for the AES and Keccak S-boxes that satisfies an important property called uniformity.
Takeshi Sugawara
doaj +1 more source
Autenticación no interactiva para internet de las cosas [PDF]
En este trabajo se propone un esquema de intercambio de información confidencial en entornos no seguros sobre redes móviles ad-hoc, basado en el concepto de demostración de conocimiento nulo no interactiva.
Caballero Gil, Cándido +2 more
core
SDN Controller Selection and Secure Resource Allocation
Software Defined Networking (SDN) has emerged as a promising paradigm for network management. However, in energy-effective task scheduling and security, the centralized control architecture of SDN brings challenges.
Sasibhushana Rao Pappu +1 more
doaj +1 more source
Key-Recovery Attacks on Full Kravatte
This paper presents a cryptanalysis of full Kravatte, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length.
Colin Chaigneau +6 more
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Differential and Linear properties of vectorial boolean functions based on chi. [PDF]
Mella S, Mehrdad A, Daemen J.
europepmc +1 more source
The Road from Panama to Keccak via RadioGatún
In this presentation, we explain the design choices of Panama [1] and RadioGatun [2], which lead to Keccak [3]. After a brief recall of Panama, RadioGatun and the trail backtracking cost, we focus on three important aspects. First, we explain the role of the belt in the light of differential trails. Second, we discuss the relative advantages of a block
Bertoni, Guido +3 more
openaire +3 more sources
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]
Torres-Alvarado A +5 more
europepmc +1 more source
Linear Cancellations in the MitM Attacks on Sponge Functions
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin +5 more
doaj +1 more source

