Results 111 to 120 of about 6,039 (185)

Sadberk Hanım Müzesi:Karia Koleksiyonu [PDF]

open access: yes
Taha Toros Arşivi, Dosya No: 114-Müzelerİstanbul Kalkınma Ajansı (TR10/14/YEN/0033) İstanbul Development Agency (TR10/14/YEN ...
Anlağan, Tanju
core  

Modelling and verification of post-quantum key encapsulation mechanisms using Maude. [PDF]

open access: yesPeerJ Comput Sci, 2023
García V   +4 more
europepmc   +1 more source

Adaptive Template Attacks on the Kyber Binomial Sampler

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems
Template attacks build a Gaussian multivariate model of the side-channel leakage signal generated by each value of a targeted intermediate variable. Combined with additional steps, such as dimensionality reduction, such models can help to infer a value with nearly 100% accuracy from just a single attack trace. We demonstrate this here by reconstructing
Peng, Eric Chun-Yu, Kuhn, Markus G
openaire   +2 more sources

Vältä kyber-kömmähdys

open access: yesTehy, 2020
Mäkelä, Jaana   +4 more
openaire   +3 more sources

Power Analytic Attacks on CRYSTALS-Kyber

open access: yes, 2023
Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi implementerte Kyber512 i ChipWhisperer-systemet og utførte angrepet tre ganger, med effektmålinger fra 1000, 200 og 50 ...
openaire   +1 more source

Home - About - Disclaimer - Privacy