Secure Message Authentication in the Presence of Leakage and Faults
Security against side-channels and faults is a must for the deployment of embedded cryptography. A wide body of research has investigated solutions to secure implementations against these attacks at different abstraction levels.
Francesco Berti +4 more
doaj +1 more source
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Homomorphic encryption enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud.
Ahmet Can Mert +6 more
doaj +1 more source
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
The ongoing NIST lightweight cryptography standardization process highlights the importance of resistance to side-channel attacks, which has renewed the interest for Authenticated Encryption schemes (AEs) with light(er)-weight sidechannel secure ...
Chun Guo +3 more
doaj +1 more source
Implementation at Multiple Levels
This chapter takes stock of the political impact of the Sustainable Development Goals within countries. It explores the various initiatives taken by national governments, sub-national authorities, the corporate sector and civil society, and assesses their strategies and approaches to implement the Sustainable Development Goals in their spheres.
Llanos, Andrea Ordóñez +15 more
openaire +3 more sources
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti +4 more
doaj +1 more source
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core +2 more sources
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
A Quantum Rosetta Stone for Interferometry [PDF]
Heisenberg-limited measurement protocols can be used to gain an increase in measurement precision over classical protocols. Such measurements can be implemented using, e.g., optical Mach-Zehnder interferometers and Ramsey spectroscopes.
Champollion J. F. +11 more
core +3 more sources
Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon
Low-latency masked hardware implementations are known to be a difficult challenge. On the one hand, the propagation of glitches can falsify their independence assumption (that is required for security) and can only be stopped by registers.
Gaëtan Cassiers +2 more
doaj +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source

