Results 31 to 40 of about 10,030,622 (339)
Multivariate Profiling of Hulls for Linear Cryptanalysis
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov +2 more
doaj +1 more source
Structured random measurements in signal processing [PDF]
Compressed sensing and its extensions have recently triggered interest in randomized signal acquisition. A key finding is that random measurements provide sparse signal reconstruction guarantees for efficient and stable algorithms with a minimal number ...
Krahmer, Felix, Rauhut, Holger
core +1 more source
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption [PDF]
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new ...
Abelson, Hal +10 more
core +4 more sources
Key Recovery: Inert and Public [PDF]
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures.
Boyd, Colin +3 more
openaire +3 more sources
Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM
Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files.
Bertrand Francis Cambou, Saloni Jain
doaj +1 more source
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
R. Rohit +3 more
semanticscholar +1 more source
Improved Attacks on LowMC with Algebraic Techniques
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj +1 more source
Transport of polymer particles in a oil-water flow in porous media: enhancing oil recovery [PDF]
We study a heuristic, core-scale model for the transport of polymer particles in a two phase (oil and water) porous medium. We are motivated by recent experimental observations which report increased oil recovery when polymers are injected after the ...
Keilegavlen, Eirik +4 more
core +2 more sources
A polynomial time key-recovery attack on the Sidon cryptosystem
. The Sidon cryptosystem [22] is a new multivariate encryption scheme based on the theory of Sidon spaces which was presented at PKC 2021. As is usual for this kind of schemes, its security relies on the hardness of solving particular instances of the MQ
P. Briaud, J. Tillich, Javier A. Verbel
semanticscholar +1 more source
Speed Optimizations in Bitcoin Key Recovery Attacks [PDF]
In this paper, we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocurrencies.
Castellucci, R, Courtois, N, Song, G
core +2 more sources

