Results 1 to 10 of about 6,988 (254)

Secure Message Authentication in the Presence of Leakage and Faults

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Security against side-channels and faults is a must for the deployment of embedded cryptography. A wide body of research has investigated solutions to secure implementations against these attacks at different abstraction levels.
Francesco Berti   +4 more
doaj   +1 more source

Medha: Microcoded Hardware Accelerator for computing on Encrypted Data

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Homomorphic encryption enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud.
Ahmet Can Mert   +6 more
doaj   +1 more source

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The ongoing NIST lightweight cryptography standardization process highlights the importance of resistance to side-channel attacks, which has renewed the interest for Authenticated Encryption schemes (AEs) with light(er)-weight sidechannel secure ...
Chun Guo   +3 more
doaj   +1 more source

Implementation at Multiple Levels

open access: yes, 2022
This chapter takes stock of the political impact of the Sustainable Development Goals within countries. It explores the various initiatives taken by national governments, sub-national authorities, the corporate sector and civil society, and assesses their strategies and approaches to implement the Sustainable Development Goals in their spheres.
Llanos, Andrea Ordóñez   +15 more
openaire   +3 more sources

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti   +4 more
doaj   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

A Quantum Rosetta Stone for Interferometry [PDF]

open access: yes, 2002
Heisenberg-limited measurement protocols can be used to gain an increase in measurement precision over classical protocols. Such measurements can be implemented using, e.g., optical Mach-Zehnder interferometers and Ramsey spectroscopes.
Champollion J. F.   +11 more
core   +3 more sources

Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Low-latency masked hardware implementations are known to be a difficult challenge. On the one hand, the propagation of glitches can falsify their independence assumption (that is required for security) and can only be stopped by registers.
Gaëtan Cassiers   +2 more
doaj   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy