Results 31 to 40 of about 10,030,622 (339)

Multivariate Profiling of Hulls for Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov   +2 more
doaj   +1 more source

Structured random measurements in signal processing [PDF]

open access: yes, 2014
Compressed sensing and its extensions have recently triggered interest in randomized signal acquisition. A key finding is that random measurements provide sparse signal reconstruction guarantees for efficient and stable algorithms with a minimal number ...
Krahmer, Felix, Rauhut, Holger
core   +1 more source

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption [PDF]

open access: yes, 1997
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new ...
Abelson, Hal   +10 more
core   +4 more sources

Key Recovery: Inert and Public [PDF]

open access: yes, 2017
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures.
Boyd, Colin   +3 more
openaire   +3 more sources

Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM

open access: yesApplied Sciences, 2022
Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files.
Bertrand Francis Cambou, Saloni Jain
doaj   +1 more source

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

open access: yesIACR Cryptology ePrint Archive, 2021
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
R. Rohit   +3 more
semanticscholar   +1 more source

Improved Attacks on LowMC with Algebraic Techniques

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj   +1 more source

Transport of polymer particles in a oil-water flow in porous media: enhancing oil recovery [PDF]

open access: yes, 2018
We study a heuristic, core-scale model for the transport of polymer particles in a two phase (oil and water) porous medium. We are motivated by recent experimental observations which report increased oil recovery when polymers are injected after the ...
Keilegavlen, Eirik   +4 more
core   +2 more sources

A polynomial time key-recovery attack on the Sidon cryptosystem

open access: yesIACR Cryptology ePrint Archive, 2021
. The Sidon cryptosystem [22] is a new multivariate encryption scheme based on the theory of Sidon spaces which was presented at PKC 2021. As is usual for this kind of schemes, its security relies on the hardness of solving particular instances of the MQ
P. Briaud, J. Tillich, Javier A. Verbel
semanticscholar   +1 more source

Speed Optimizations in Bitcoin Key Recovery Attacks [PDF]

open access: yes, 2016
In this paper, we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocurrencies.
Castellucci, R, Courtois, N, Song, G
core   +2 more sources

Home - About - Disclaimer - Privacy