Results 1 to 10 of about 397,696 (287)
Implementing Packaged Software [PDF]
This article presents a model of the implementation process for dedicated packages and describes a research project to test the model undertaken with the cooperation of a major computer vendor. Data were collected from 78 individuals in 18 firms using the package and from the package vendor.
Henry C. Lucas +3 more
+6 more sources
As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security issues related to MCIS have become increasingly important. Therefore, the development and research of security technologies for mobile communication and internet systems
Minjoo Sim +5 more
doaj +1 more source
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj +1 more source
Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
The security of lattice-based cryptosystems is based on solving hard lattice problems such as the shortest vector problem (SVP) and the closest vector problem (CVP).
Hami Satılmış +2 more
doaj +1 more source
Open-Source Implementations of the Reactive Asset Administration Shell: A Survey
The use of open-source software is crucial for the digitalization of manufacturing, including the implementation of Digital Twins as envisioned in Industry 4.0.
Michael Jacoby +6 more
doaj +1 more source
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms
We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 and M3 devices.
Olivier Bronchain +1 more
doaj +1 more source
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms.
Görkem Nişancı +2 more
doaj +1 more source
A Tale of Resilience: On the Practical Security of Masked Software Implementations
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the
Lorenzo Casalino +3 more
doaj +1 more source
Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13-310 and BW19-286, sparked interest in the field of public-key cryptography as small sizes of the prime fields.
Yu Dai, Fangguo Zhang, Chang-an Zhao
doaj +1 more source
Contains fulltext : 168765.pdf (Publisher’s version ) (Open Access)
Aranha, D.F. +3 more
openaire +1 more source

