Results 51 to 60 of about 3,739 (238)

SCVerify: Verification of Software Implementation Against Power Side-Channel Attacks

open access: yesJisuanji kexue yu tansuo, 2021
Power side-channel attacks, have become a serious threat to embedded computing devices in cyber-physical systems because of the ability of deducing secret data using statistical analysis.
ZHANG Jun
doaj   +1 more source

Cube-like Attack on Round-Reduced Initialization of Ketje Sr

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primary recommendation is Ketje Sr.
Xiaoyang Dong   +3 more
doaj   +1 more source

Differential Trail Search in Cryptographic Primitives with Big-Circle Chi:

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Proving upper bounds for the expected differential probability (DP) of differential trails is a standard requirement when proposing a new symmetric primitive.
Alireza Mehrdad   +3 more
doaj   +1 more source

Revisiting Shared Data Protection Against Key Exposure

open access: yes, 2020
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido   +7 more
core   +1 more source

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet   +3 more
doaj   +1 more source

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

Criticality Aware Soft Error Mitigation in the Configuration Memory of SRAM based FPGA

open access: yes, 2018
Efficient low complexity error correcting code(ECC) is considered as an effective technique for mitigation of multi-bit upset (MBU) in the configuration memory(CM)of static random access memory (SRAM) based Field Programmable Gate Array (FPGA) devices ...
Chakrabarti, Amlan   +4 more
core   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Research on differential properties of Keccak-like nonlinear transform

open access: yesTongxin xuebao, 2012
By analyzing the nonlinear transformation in Keccak,n-gram Keccak-like nonlinear transform model was proposed firstly,and the differential properties of this kind of transformation was studied.They are proved that to the n-gram Keccak-like nonlinear ...
Qian-nan LI   +3 more
doaj   +2 more sources

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Home - About - Disclaimer - Privacy