Results 11 to 20 of about 10,030,622 (339)

Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments. [PDF]

open access: yesSensors (Basel), 2021
Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security.
Kim T, Kim W, Seo D, Lee I.
europepmc   +2 more sources

Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors

open access: yesIACR Cryptology ePrint Archive, 2023
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen ...
Julius Hermelink   +4 more
semanticscholar   +1 more source

Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
. Well before large-scale quantum computers will be available, traditional cryptosystems must be transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims to standardize suitable cryptographic schemes.
Qian Guo   +5 more
semanticscholar   +1 more source

A Key-Recovery Side-Channel Attack on Classic McEliece

open access: yesIACR Cryptology ePrint Archive, 2022
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project. Our novel idea is to design an attack algorithm where we submit special ciphertexts to
Qian Guo, A. Johansson, T. Johansson
semanticscholar   +1 more source

Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles â€" A case study of Kyber

open access: yesIACR Cryptology ePrint Archive, 2022
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e ...
Muyan Shen   +4 more
semanticscholar   +1 more source

New Key Recovery Attack on Reduced-Round AES

open access: yesIACR Cryptology ePrint Archive, 2022
A new fundamental 4-round property of AES, called the zero-difference property, was introduced by Rønjom, Bardeh and Helleseth at Asiacrypt 2017.
N. Bardeh, V. Rijmen
semanticscholar   +1 more source

Improvement in survivorship: The key for population recovery? [PDF]

open access: yes, 2016
In northern Patagonia, commercial harvesting of South American sea lions, Otaria flavescens, from 1920 to 1960, decimated its population abundance. Population recovery was not immediate after hunting ceased in 1962.
Crespo, Enrique Alberto   +2 more
core   +1 more source

A physical model for calculating cementing quality based on the XGboost algorithm

open access: yesOpen Physics, 2022
A physical model can be used to judge cementing quality to help drilling engineering. This article reports a physical model based on the XGboost algorithm to solve the cementing quality prediction problem of oil and gas wells. Through the physical model,
Xie Yuchen   +4 more
doaj   +1 more source

A Generic Sample Splitting Approach for Refined Community Recovery in Stochastic Block Models [PDF]

open access: yes, 2014
We propose and analyze a generic method for community recovery in stochastic block models and degree corrected block models. This approach can exactly recover the hidden communities with high probability when the expected node degrees are of order $\log ...
Lei, Jing, Zhu, Lingxue
core   +1 more source

Practical key recovery attacks on FlexAEAD

open access: yesDesigns, Codes and Cryptography, 2022
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dunkelman, Orr   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy