Results 21 to 30 of about 6,104 (190)
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given ...
Gokulnath Rajendran +4 more
doaj +1 more source
Morality at play: pretend play in five-year-old children [PDF]
The concept of 'play' is notoriously ambiguous, but we do know that when children engage in make-believe play the activity provides benefits for psychological development, holistic health, and building knowledge and relationships.
Bateman, Amanda, Roberts, Peri
core +2 more sources
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Masking is the main countermeasure against side-channel attacks on embedded devices. For cryptographic algorithms that combine Boolean and arithmetic masking, one must therefore convert between the two types of masking, without leaking additional ...
Jean-Sébastien Coron +3 more
doaj +1 more source
Contains fulltext : 315394.pdf (Publisher’s version ) (Open Access)
Barbosa, M., Schwabe, P.
openaire +1 more source
NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song +4 more
doaj +1 more source
Higher-Order Energy Expansions and Spike Locations [PDF]
We consider the following singularly perturbed semilinear elliptic problem: (I)\left\{ \begin{array}{l} \epsilon^{2} \Delta u - u + f(u)=0 \ \ \mbox{in} \ \Omega, \\ u>0 \ \ \mbox{in} \ \ \Omega \ \ \mbox{and} \ \frac{\partial u}{\partial \nu}
Wei, J, Winter, M
core +1 more source
Cortex-M4 optimizations for {R,M} LWE schemes
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller.
Erdem Alkim +3 more
doaj +1 more source
Pre-integration lateral inhibition enhances unsupervised learning [PDF]
A large and influential class of neural network architectures use post-integration lateral inhibition as a mechanism for competition. We argue that these algorithms are computationally deficient in that they fail to generate, or learn, appropriate ...
Johnson, M. H., Spratling, M. W.
core +3 more sources
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann +6 more
doaj +1 more source
Graphical Markov models: overview [PDF]
We describe how graphical Markov models started to emerge in the last 40 years, based on three essential concepts that had been developed independently more than a century ago.
Andersen +73 more
core +2 more sources

