Results 11 to 20 of about 436 (71)
Picnic with Friends: Constructing post quantum digital signature schemes [PDF]
Det digitale signatursystemet, Picnic [5], er et post-kvantesystem som ble introdusert som en del av NIST-prosessen for å standardisere post-kvantekryptografi [15]. Vi ser på hvordan Picnic er konstruert, og sikkerhetsegenskapene til systemet.
Millerjord, Lise
core
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers [PDF]
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open problem how to build such ciphers. In this work,
A Albertini +31 more
core +1 more source
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search [PDF]
The $k$-Nearest Neighbor Search ($k$-NNS) is the backbone of several cloud-based services such as recommender systems, face recognition, and database search on text and images.
Chen, Hao +5 more
core +1 more source
A Survey of Quantum-safe Digital Signatures and their building blocks [PDF]
Sikkerhet og personvern på internett som vi kjenner i dag, er truet av den nye teknologien for å bygge større og kommersielle kvantecomputere. Selv om kvantecomputere som er bygget er relativt små, og ikke veldig effektive for å forstyrre Public Key ...
Sridhar, Sahana
core
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair [PDF]
Cryptanalysis of the LowMC block cipher when the attacker has access to a single known plaintext/ciphertext pair is a mathematically challenging problem.
Hailun Yan +3 more
core +1 more source
Superposed epoch study of ICME sub-structures near Earth and their effects on galactic cosmic rays
Interplanetary coronal mass ejections (ICMEs) are the interplanetary manifestations of solar eruptions. The overtaken solar wind forms a sheath of compressed plasma at the front of ICMEs.
Dasso, S. +4 more
core +3 more sources
Differential Power Analysis of the Picnic Signature Scheme [PDF]
This work introduces the first differential side-channel analysis of the Picnic Signature Scheme, an alternate candidate in the ongoing competition for post-quantum cryptography by the National Institute of Standards and Technology (NIST).
Okan Seker +2 more
core
Eliminating Variables in Boolean Equation Systems [PDF]
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar +3 more
core +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
Implementing Grover oracles for quantum key search on AES and LowMC [PDF]
Grover\u27s search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses $O(\sqrt{N})$ calls to the cipher to search a key space of size $N$.
Fernando Virdia +3 more
core

