Results 51 to 60 of about 2,808 (186)

Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]

open access: yes, 2018
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core   +1 more source

EthVault: A Secure and Resource‐Conscious FPGA‐Based Ethereum Cold Wallet

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This work presents EthVault, the first hardware‐based Ethereum hierarchical deterministic cold wallet, featuring FPGA implementations of key cryptographic algorithms for secure key generation. A novel ECC architecture resilient to side‐channel and timing attacks, along with an efficient child key derivation function, are introduced. Implementation on a
Joel Poncha Lemayian   +3 more
wiley   +1 more source

GPU Accelerated Keccak (SHA3) Algorithm

open access: yes, 2019
Hash functions like SHA-1 or MD5 are one of the most important cryptographic primitives, especially in the field of information integrity. Considering the fact that increasing methods have been proposed to break these hash algorithms, a competition for a new family of hash functions was held by the US National Institute of Standards and Technology ...
Wang, Canhui, Chu, Xiaowen
openaire   +2 more sources

Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 [PDF]

open access: yes, 2016
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
Amy, Matthew   +5 more
core   +1 more source

Barrel Shifter Physical Unclonable Function Based Encryption

open access: yes, 2017
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy   +2 more
core   +1 more source

A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the ...
Yanhong Fan   +4 more
wiley   +1 more source

Conditional Cube Attack on Round-Reduced ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al.
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
doaj   +1 more source

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

Assessing Data Usefulness for Failure Analysis in Anonymized System Logs

open access: yes, 2018
System logs are a valuable source of information for the analysis and understanding of systems behavior for the purpose of improving their performance. Such logs contain various types of information, including sensitive information.
Ciorba, Florina M., Ghiasvand, Siavash
core   +1 more source

Enhancing Medical Images Security and Efficiency With Adaptive Compressed Sensing and SHA‐3 in Telemedicine

open access: yesInternational Journal of Biomedical Imaging, Volume 2025, Issue 1, 2025.
Security issues of telemedicine‐based secure transmission of medical images find a very thin line drawn between diagnostic acceptability and cybersecurity. Partial but imperfect solutions emerge. JPEG2000 and HEVC concentrate only on compression, failing to provide any security consideration.
Ashraf Al Sharah   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy