Filters








801 Hits in 3.1 sec

Differential Power Analysis of the Picnic Signature Scheme [article]

Tim Gellersen, Okan Seker, Thomas Eisenbarth
2020 IACR Cryptology ePrint Archive  
This work introduces the first differential side-channel analysis of the Picnic Signature Scheme, an alternate candidate in the ongoing competition for post-quantum cryptography by the National Institute  ...  LowMC key recovery then allows to forge signatures for the calling Picnic post-quantum signature scheme. We target the NIST reference implementation executed on a FRDM-K66F development board.  ...  Acknowledgments This work has been supported by the German Federal Ministry of Education and Research (BMBF) under the project PQC4MED (FKZ 16KIS1045).  ... 
dblp:journals/iacr/GellersenSE20 fatcat:pjux27uc2ffkzkpxkpjgept5gu

Post-Quantum Authentication with Lightweight Cryptographic Primitives [article]

Henrique Faria, José Manuel Valença
2021 IACR Cryptology ePrint Archive  
Additionally, a modification of PICNIC is introduced as PICNIC+WOTS where PICNIC is used to generate the secret keys for several WOTS+ signatures significantly reducing the size and signature time of each  ...  We propose to adapt "low-algebra" digital signature schemes SPHINCS+ and PICNIC, present in the NIST-PQC contest, to the limitations of resource-bounded low-end devices.  ...  PICNIC PICNIC is a signature scheme based in a non-interactive zero knowledge proof of knowledge of a circuit's input.  ... 
dblp:journals/iacr/FariaV21 fatcat:fl66iu3y2nd5lcxlstgx2bn5dy

Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto [article]

Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
2021 IACR Cryptology ePrint Archive  
To the best of our knowledge, it is the first MPCitH-based signature scheme which can produce signatures that are less than 5 KB in size; it also outperforms previous Picnic and Banquet instances in all  ...  This simplifies schemes like Picnic and it also leads to the fastest and smallest AES-based signatures, where we achieve signature sizes of around 10.8 to 14.2 KB using AES-128, on average 10% shorter  ...  A.3 Security Proof of Rainier Since the Rainier signature scheme is similar to Banquet the security analysis is also similar.  ... 
dblp:journals/iacr/DobraunigKRSZ21 fatcat:mkk62be3c5e37e2wsqbp6oy3ci

Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research [article]

Ritik Bavdekar, Eashan Jayant Chopde, Ashutosh Bhatia, Kamlesh Tiwari, Sandeep Joshua Daniel, Atul
2022 arXiv   pre-print
Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES.  ...  This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum  ...  They include simple timing attacks, simple power attacks, differential power attacks, and fault analysis. The variance, amplitude, and shape of voltage peaks can be analyzed by the attacker [13] .  ... 
arXiv:2202.02826v1 fatcat:ghq4lqiu4rf5vpuv6gbk7ws4jm

Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions

Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla
2020 Cryptography  
Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when blockchain is combined with digital signatures, it verifies  ...  The third scheme we are proposing is the use of noise injection techniques used with high-performance computing to increase the security of the system.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/cryptography4020017 fatcat:ovkl4gkh2vhsfaggqberyrmq4y

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements.  ...  A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality.  ...  Furthermore, NIST has chosen 8 alternate candidates for the third round, i.e., FrodoKEM, NTRU Prime, BIKE, HQC, SIKE as KEM schemes, and SPHINCS+, Picnic, GeMSS as signature schemes.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Development of Cryptography since Shannon [article]

Funda Özdemir, Çetin Kaya Koç
2022 IACR Cryptology ePrint Archive  
This paper presents the development of cryptography since Shannon's seminal paper "Communication Theory of Secrecy Systems" in 1949.  ...  SecretKeyGen: For O(2 λ ) security, we choose the parameters of the scheme as a power of two m = 2n, a real value γ, an integer h, an integer P , and the base p.  ...  Table 1 : 1 Effectiveness of differential cryptanalysis.  ... 
dblp:journals/iacr/OzdemirK22 fatcat:wzia5wptezdt3guwsic2a4oo6m

Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches [article]

Viet B. Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
2020 IACR Cryptology ePrint Archive  
usage, as well as in terms of security against physical attacks, including side-channel analysis.  ...  Hardware implementations of cryptographic operations may quite easily outperform software implementations for at least a subset of major performance metrics, such as speed, power consumption, and energy  ...  Nguyen, and K.Gaj 21 Table 11 : 11 Power and Energy Comparison for Digital Signature Schemes on ASIC SRAM Key Generation Signature Verification Signature Generation Technology (kB) Power Energy Power  ... 
dblp:journals/iacr/DangFAMNG20 fatcat:l632lw4f6bgixfv2otzmpi7cmm

Algebraic Meet-in-the-Middle Attack on LowMC [article]

Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe
2022 IACR Cryptology ePrint Archive  
Moreover, while an efficient algebraic technique to retrieve the full key from a differential trail of LowMC has been proposed at CRYPTO 2021, its time complexity is still exponential in the key size.  ...  Based on it, we can reduce the memory complexity of the simple difference enumeration attack over the state-of-the-art.  ...  most important application of LowMC is the Picnic signature scheme, which is an alternate third-round candidate in NIST post-quantum cryptography competition.  ... 
dblp:journals/iacr/LiuWMSI22 fatcat:kaz4gk6xprfqjfyboubq6lbsuu

Decoding fMRI Signatures of Real-world Autobiographical Memory Retrieval

Jesse Rissman, Tiffany E. Chow, Nicco Reggente, Anthony D. Wagner
2016 Journal of Cognitive Neuroscience  
■ Extant neuroimaging data implicate frontoparietal and medialtemporal lobe regions in episodic retrieval, and the specific pattern of activity within and across these regions is diagnostic of an individual's  ...  Its contents do not necessarily represent official views of either the John D. and Catherine T.  ...  MacArthur Foundation or the MacArthur Foundation Research Network on Law and Neuroscience (www.lawneuro. org).  ... 
doi:10.1162/jocn_a_00920 pmid:26741803 fatcat:jd6ulu5lrzaancwyjm3t3len6a

Quantum Randomness in Cryptography—A Survey of Cryptosystems, RNG-Based Ciphers, and QRNGs

Anish Saini, Athanasios Tsokanos, Raimund Kirner
2022 Information  
Even though the cryptographic algorithms are public and their strength depends on the keys, cryptoanalysis of encrypted ciphers can significantly contribute to the unveiling of the cipher's key.  ...  , and the design of quantum random number generators (QRNGs).  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info13080358 fatcat:c2wsomzpobbkvbwg46jcnfrhlq

Pan-Cancer Metabolic Signature Predicts Co-Dependency on Glutaminase and De Novo Glutathione Synthesis Linked to a High-Mesenchymal Cell State

Anneleen Daemen, Bonnie Liu, Kyung Song, Mandy Kwong, Min Gao, Rebecca Hong, Michelle Nannini, David Peterson, Bianca M. Liederer, Cecile de la Cruz, Dewakar Sangaraju, Allan Jaochico (+8 others)
2018 Cell Metabolism  
predictive biomarkers of response to GLS1 inhibition d Signature predicts response in mesenchymal breast and lung tumors and across TCGA  ...  Highlights d Dual role in energy and glutathione synthesis drives tumor GLS1 dependency d Cell line-derived diagnostic signature is predictive of GLS1 dependency in vivo d Glutamate and citrate are key  ...  Using this dataset, we derive a pan-cancer diagnostic metabolic gene expression signature of GLS1/GCS co-dependency, test its predictive power in vivo, and analyze pan-cancer expression data from The Cancer  ... 
doi:10.1016/j.cmet.2018.06.003 pmid:30043751 fatcat:gbtqr7g47rhhfoyy4pe3qpxrwi

The taste of freedom: commensality, liminality, and return amongst Afghan transnational migrants in the UK and Pakistan

Nichola Khan
2014 Journal of the Royal Anthropological Institute  
Picnic is picnic!’ A flavour of the past When I remember the mountaintops of Pakhtunkhwa (my Afghan land), I forget the throne of Delhi.  ...  The nexus of history, identity-formation, and travel entailed on chakar bears on Marsden’s analysis of the movements of Tajik and Afghan refugees moving around North Pakistan.  ... 
doi:10.1111/1467-9655.12115 fatcat:ricpmr3avjbd3darm5gt2ytthy

An overview of image steganography

T. Morkel, Jan H. P. Eloff, Martin S. Olivier
2005 Information Security for South Africa  
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.  ...  Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.  ...  to ensure the security of others. 6.  ... 
dblp:conf/issa/MorkelEO05 fatcat:ulgbiwkgqjgbbd46srwoqeawbq

Grassroots Environmental Activism in an Authoritarian Context: The Trees Movement in Vietnam

Ngoc Anh Vu
2017 VOLUNTAS - International Journal of Voluntary and Nonprofit Organizations  
Yet, the majority of this literature has focused on the activities of NGOs.  ...  The existing studies have linked the changes in civil society action to the changing dynamics of state-society relations in one-party-ruled Vietnam.  ...  Voluntas Compliance with Ethical Standards Conflict of interest The author declares that there is no conflict of interest under any circumstances.  ... 
doi:10.1007/s11266-017-9829-1 fatcat:o62ypcgf7vaepib23dj5ngbcqu
« Previous Showing results 1 — 15 out of 801 results