نتایج جستجو برای: decapsulation
تعداد نتایج: 134 فیلتر نتایج به سال:
Attribute-based encryption (ABE) is a promising encryption for fine-grained sharing of ciphertext based on users’ attributes. One drawback of ABE is that the encryption and decryption computational costs grow with the number of attributes and the complexity of the access policy. In scenarios where mobile devices are required, it will make encryption and decryption a possible bottleneck for thes...
INTRODUCTION Phosphate binding with sevelamer can ameliorate detrimental histomorphometric changes of bone in chronic renal insufficiency (CRI). Here we explored the effects of sevelamer-HCl treatment on bone strength and structure in experimental CRI. METHODS Forty-eight 8-week-old rats were assigned to surgical 5/6 nephrectomy (CRI) or renal decapsulation (Sham). After 14 weeks of disease p...
Plasma renin activity and renin substrate levels were measured during the development of cellophane perinephritis hypertension induced by either a bilateral renal wrap procedure or a wrap-nephrectomy procedure in 28 rabbits. Unoperated and unilaterally nephrectomized controls were also studied. Plasma renin concentration was derived from plasma renin activity and plasma renin substrate levels u...
The candidates for the NIST Post-Quantum Cryptography standardization have undergone extensive studies on efficiency and theoretical security, but research their side-channel security is largely lacking. This remains a considerable obstacle real-world deployment, where can be critical requirement. work describes side-channel-resistant instance of Saber, one lattice-based candidates, using maski...
Cladocerans are able to produce resting eggs inside a protective resistant capsule, the ephippium, that difficults the visualization of the resting eggs, because of the dark pigmentation. Therefore, before hatching experiments, methods to verify viable resting eggs in ephippia must be considered. This study aimed to evaluate the number of eggs per ephippium of Daphnia from two tropical aquatic ...
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based the Fujisaki–Okamoto (FO) transformation and its variants. Many post-quantum KEMs usually perform re-encryption during decapsulation to achieve chosen-ciphertext attack (CCA) security. The leakage of can be exploited mount key-recovery plaintext-checking (KR-PCA), even if chosen-plaintext secure...
In the final phase of post-quantum cryptography standardization effort, focus has been extended to include side-channel resistance candidates. While some schemes have already extensively analyzed in this regard, there is no such study yet finalist Kyber.In work, we demonstrate first completely masked implementation Kyber which protected against first- and higher-order attacks. To best our knowl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید