نتایج جستجو برای: decapsulation

تعداد نتایج: 134  

2011
Giora Feuerstein

1. Haas, J. A., J. P. Granger, and F. G. Knox. Effect of renal perfusion pressure on sodium reabsorption from proximal tubules of superficial and deep nephrons. Am. /. Physiol. 250 (Renal Fluid Electrolyte Physio/. 19): F425-F429, 1986. 2. Hartupee, D. A., J. C. Burnett. Jr., J. I. Mertz, and F. G. Knox. Acetylcholineinduced vasodilation without natriuresis du ring control of interstitial press...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2022

We present the first specification-compliant constant-time FPGA implementation of Classic McEliece cryptosystem from third-round NIST’s Post-Quantum Cryptography standardization process. In particular, we complete including encapsulation and decapsulation modules as well key generation with seed expansion. All hardware are parametrizable, at compile time, security level performance parameters. ...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

BIKE is a Key Encapsulation Mechanism selected as an alternate candidate in NIST’s PQC standardization process, which performance plays significant role the third round. This paper presents FPGA implementations of with best area-time reported literature. We optimize two key arithmetic operations, are sparse polynomial multiplication and inversion. Our multiplier achieves time-constancy for poly...

Journal: :Žurnal Grodnenskogo gosudarstvennogo medicinskogo universiteta 2022

Background. One of the life-threatening diseases among patients with a single kidney is acute purulent pyelonephritis (APP). The disease accompanied by oliguria or anuria and in many cases comes development multiple organ dysfunction. Objectives. To present features clinical manifestations APP solitary kidney, results laboratory examination, role imaging methods (USG, MRI contrast-enhanced CT) ...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research effort, cost analysis efficient side-channel countermeasures is still lacking. In this work, we propose masked HW/SW codesign NIST PQC finalis...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they secure in the chosen-ciphertext model. Our involve construction of malformed ciphertexts. When decapsulated by target device, these ciphertexts ensure a targeted intermediate variable becomes very closely relate...

Journal: :IEEE Transactions on Computers 2023

We propose design methodologies for building a compact, unified and programmable cryptoprocessor architecture that computes post-quantum key agreement digital signature. Synergies in the two types of cryptographic primitives are used to make compact. As case study, has been optimized targeting signature scheme ’CRYSTALS-Dilithium’ encapsulation mechanism (KEM) ’Saber,’ both finalists NIST's cry...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید