Results 101 to 110 of about 2,808 (186)

3-Share Threshold Implementation of AES S-box without Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Threshold implementation is studied as a countermeasure against sidechannel attack. There had been no threshold implementation for the AES and Keccak S-boxes that satisfies an important property called uniformity.
Takeshi Sugawara
doaj   +1 more source

Autenticación no interactiva para internet de las cosas [PDF]

open access: yes, 2014
En este trabajo se propone un esquema de intercambio de información confidencial en entornos no seguros sobre redes móviles ad-hoc, basado en el concepto de demostración de conocimiento nulo no interactiva.
Caballero Gil, Cándido   +2 more
core  

SDN Controller Selection and Secure Resource Allocation

open access: yesIEEE Access
Software Defined Networking (SDN) has emerged as a promising paradigm for network management. However, in energy-effective task scheduling and security, the centralized control architecture of SDN brings challenges.
Sasibhushana Rao Pappu   +1 more
doaj   +1 more source

Key-Recovery Attacks on Full Kravatte

open access: yesIACR Transactions on Symmetric Cryptology, 2018
This paper presents a cryptanalysis of full Kravatte, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length.
Colin Chaigneau   +6 more
doaj   +1 more source

The Road from Panama to Keccak via RadioGatún

open access: yes, 2009
In this presentation, we explain the design choices of Panama [1] and RadioGatun [2], which lead to Keccak [3]. After a brief recall of Panama, RadioGatun and the trail backtracking cost, we focus on three important aspects. First, we explain the role of the belt in the light of differential trails. Second, we discuss the relative advantages of a block
Bertoni, Guido   +3 more
openaire   +3 more sources

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]

open access: yesSensors (Basel), 2022
Torres-Alvarado A   +5 more
europepmc   +1 more source

Keccak [PDF]

open access: yes, 2013
Guido Bertoni   +3 more
openaire   +1 more source

Linear Cancellations in the MitM Attacks on Sponge Functions

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy