Results 71 to 80 of about 1,329 (153)

Memory Encryption for Smart Cards Barı¸s Ege 1, Elif Bilge Kavun 2,andTolgaYalçın 2 [PDF]

open access: yes
. With the latest advances in attack methods, it has become increasingly more difficult to secure data stored on smart cards, especially on non-volatile memories (NVMs), which may store sensitive information such as cryptographic keys or program code ...

core  

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]

open access: yes, 2016
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle   +12 more
core   +2 more sources

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +1 more source

Tweakable enciphering schemes using only the encryption function of a block cipher [PDF]

open access: yesInformation Processing Letters, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors

open access: yes, 2014
International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology.
Baganne, A   +5 more
core   +1 more source

Алгоритм установления общего секретного значения, основанный на эллиптических кривых [PDF]

open access: yes, 2014
Конфіденційність повідомлення забезпечується шифруванням повідомлення за допомогою алгоритму шифрування даних. При великому розмірі документа таким алгоритмом може бути тільки алгоритм симетричного шифрування.
Kochubinsky, Anatoly   +8 more
core  

Security analysis of NIST-LWC contest finalists [PDF]

open access: yes, 2023
Dissertação de mestrado integrado em Informatics EngineeringTraditional cryptographic standards are designed with a desktop and server environment in mind, so, with the relatively recent proliferation of small, resource constrained devices in the ...
Fernandes, João Pedro Dias
core  

Fast AES-Based Universal Hash Functions and MACs

open access: yesIACR Transactions on Symmetric Cryptology
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as ...
Augustin Bariant   +5 more
doaj   +1 more source

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy