Results 31 to 40 of about 2,808 (186)

Revisiting Shared Data Protection Against Key Exposure

open access: yes, 2020
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido   +7 more
core   +3 more sources

Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

open access: yesIEEE Access, 2018
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj   +1 more source

SCVerify: Verification of Software Implementation Against Power Side-Channel Attacks

open access: yesJisuanji kexue yu tansuo, 2021
Power side-channel attacks, have become a serious threat to embedded computing devices in cyber-physical systems because of the ability of deducing secret data using statistical analysis.
ZHANG Jun
doaj   +1 more source

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices

open access: yesInformation, 2023
Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including ...
Argyrios Sideris   +2 more
doaj   +1 more source

Differential Trail Search in Cryptographic Primitives with Big-Circle Chi:

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Proving upper bounds for the expected differential probability (DP) of differential trails is a standard requirement when proposing a new symmetric primitive.
Alireza Mehrdad   +3 more
doaj   +1 more source

Cube-like Attack on Round-Reduced Initialization of Ketje Sr

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primary recommendation is Ketje Sr.
Xiaoyang Dong   +3 more
doaj   +1 more source

Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3 [PDF]

open access: yes, 2017
Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the
Atighehchi, Kevin, Bonnecaze, Alexis
core   +3 more sources

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Research on differential properties of Keccak-like nonlinear transform

open access: yesTongxin xuebao, 2012
By analyzing the nonlinear transformation in Keccak,n-gram Keccak-like nonlinear transform model was proposed firstly,and the differential properties of this kind of transformation was studied.They are proved that to the n-gram Keccak-like nonlinear ...
Qian-nan LI   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy