Results 21 to 30 of about 6,104 (190)

Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given ...
Gokulnath Rajendran   +4 more
doaj   +1 more source

Morality at play: pretend play in five-year-old children [PDF]

open access: yes, 2018
The concept of 'play' is notoriously ambiguous, but we do know that when children engage in make-believe play the activity provides benefits for psychological development, holistic health, and building knowledge and relationships.
Bateman, Amanda, Roberts, Peri
core   +2 more sources

High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Masking is the main countermeasure against side-channel attacks on embedded devices. For cryptographic algorithms that combine Boolean and arithmetic masking, one must therefore convert between the two types of masking, without leaking additional ...
Jean-Sébastien Coron   +3 more
doaj   +1 more source

Kyber terminates [PDF]

open access: yesPolynesian Journal of Mathematics
Contains fulltext : 315394.pdf (Publisher’s version ) (Open Access)
Barbosa, M., Schwabe, P.
openaire   +1 more source

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Higher-Order Energy Expansions and Spike Locations [PDF]

open access: yes, 2004
We consider the following singularly perturbed semilinear elliptic problem: (I)\left\{ \begin{array}{l} \epsilon^{2} \Delta u - u + f(u)=0 \ \ \mbox{in} \ \Omega, \\ u>0 \ \ \mbox{in} \ \ \Omega \ \ \mbox{and} \ \frac{\partial u}{\partial \nu}
Wei, J, Winter, M
core   +1 more source

Cortex-M4 optimizations for {R,M} LWE schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller.
Erdem Alkim   +3 more
doaj   +1 more source

Pre-integration lateral inhibition enhances unsupervised learning [PDF]

open access: yes, 2002
A large and influential class of neural network architectures use post-integration lateral inhibition as a mechanism for competition. We argue that these algorithms are computationally deficient in that they fail to generate, or learn, appropriate ...
Johnson, M. H., Spratling, M. W.
core   +3 more sources

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann   +6 more
doaj   +1 more source

Graphical Markov models: overview [PDF]

open access: yes, 2015
We describe how graphical Markov models started to emerge in the last 40 years, based on three essential concepts that had been developed independently more than a century ago.
Andersen   +73 more
core   +2 more sources

Home - About - Disclaimer - Privacy