A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Differential Power Analysis of the Picnic Signature Scheme
[article]
2020
IACR Cryptology ePrint Archive
This work introduces the first differential side-channel analysis of the Picnic Signature Scheme, an alternate candidate in the ongoing competition for post-quantum cryptography by the National Institute ...
LowMC key recovery then allows to forge signatures for the calling Picnic post-quantum signature scheme. We target the NIST reference implementation executed on a FRDM-K66F development board. ...
Acknowledgments This work has been supported by the German Federal Ministry of Education and Research (BMBF) under the project PQC4MED (FKZ 16KIS1045). ...
dblp:journals/iacr/GellersenSE20
fatcat:pjux27uc2ffkzkpxkpjgept5gu
Post-Quantum Authentication with Lightweight Cryptographic Primitives
[article]
2021
IACR Cryptology ePrint Archive
Additionally, a modification of PICNIC is introduced as PICNIC+WOTS where PICNIC is used to generate the secret keys for several WOTS+ signatures significantly reducing the size and signature time of each ...
We propose to adapt "low-algebra" digital signature schemes SPHINCS+ and PICNIC, present in the NIST-PQC contest, to the limitations of resource-bounded low-end devices. ...
PICNIC PICNIC is a signature scheme based in a non-interactive zero knowledge proof of knowledge of a circuit's input. ...
dblp:journals/iacr/FariaV21
fatcat:fl66iu3y2nd5lcxlstgx2bn5dy
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
[article]
2021
IACR Cryptology ePrint Archive
To the best of our knowledge, it is the first MPCitH-based signature scheme which can produce signatures that are less than 5 KB in size; it also outperforms previous Picnic and Banquet instances in all ...
This simplifies schemes like Picnic and it also leads to the fastest and smallest AES-based signatures, where we achieve signature sizes of around 10.8 to 14.2 KB using AES-128, on average 10% shorter ...
A.3 Security Proof of Rainier Since the Rainier signature scheme is similar to Banquet the security analysis is also similar. ...
dblp:journals/iacr/DobraunigKRSZ21
fatcat:mkk62be3c5e37e2wsqbp6oy3ci
Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research
[article]
2022
arXiv
pre-print
Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. ...
This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum ...
They include simple timing attacks, simple power attacks, differential power attacks, and fault analysis. The variance, amplitude, and shape of voltage peaks can be analyzed by the attacker [13] . ...
arXiv:2202.02826v1
fatcat:ghq4lqiu4rf5vpuv6gbk7ws4jm
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
2020
Cryptography
Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when blockchain is combined with digital signatures, it verifies ...
The third scheme we are proposing is the use of noise injection techniques used with high-performance computing to increase the security of the system. ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
doi:10.3390/cryptography4020017
fatcat:ovkl4gkh2vhsfaggqberyrmq4y
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
2021
IEEE Access
As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements. ...
A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality. ...
Furthermore, NIST has chosen 8 alternate candidates for the third round, i.e., FrodoKEM, NTRU Prime, BIKE, HQC, SIKE as KEM schemes, and SPHINCS+, Picnic, GeMSS as signature schemes. ...
doi:10.1109/access.2021.3062201
fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
Development of Cryptography since Shannon
[article]
2022
IACR Cryptology ePrint Archive
This paper presents the development of cryptography since Shannon's seminal paper "Communication Theory of Secrecy Systems" in 1949. ...
SecretKeyGen: For O(2 λ ) security, we choose the parameters of the scheme as a power of two m = 2n, a real value γ, an integer h, an integer P , and the base p. ...
Table 1 : 1 Effectiveness of differential cryptanalysis. ...
dblp:journals/iacr/OzdemirK22
fatcat:wzia5wptezdt3guwsic2a4oo6m
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
[article]
2020
IACR Cryptology ePrint Archive
usage, as well as in terms of security against physical attacks, including side-channel analysis. ...
Hardware implementations of cryptographic operations may quite easily outperform software implementations for at least a subset of major performance metrics, such as speed, power consumption, and energy ...
Nguyen, and K.Gaj 21
Table 11 : 11 Power and Energy Comparison for Digital Signature Schemes on ASIC SRAM Key Generation Signature Verification Signature Generation Technology (kB) Power Energy Power ...
dblp:journals/iacr/DangFAMNG20
fatcat:l632lw4f6bgixfv2otzmpi7cmm
Algebraic Meet-in-the-Middle Attack on LowMC
[article]
2022
IACR Cryptology ePrint Archive
Moreover, while an efficient algebraic technique to retrieve the full key from a differential trail of LowMC has been proposed at CRYPTO 2021, its time complexity is still exponential in the key size. ...
Based on it, we can reduce the memory complexity of the simple difference enumeration attack over the state-of-the-art. ...
most important application of LowMC is the Picnic signature scheme, which is an alternate third-round candidate in NIST post-quantum cryptography competition. ...
dblp:journals/iacr/LiuWMSI22
fatcat:kaz4gk6xprfqjfyboubq6lbsuu
Decoding fMRI Signatures of Real-world Autobiographical Memory Retrieval
2016
Journal of Cognitive Neuroscience
■ Extant neuroimaging data implicate frontoparietal and medialtemporal lobe regions in episodic retrieval, and the specific pattern of activity within and across these regions is diagnostic of an individual's ...
Its contents do not necessarily represent official views of either the John D. and Catherine T. ...
MacArthur Foundation or the MacArthur Foundation Research Network on Law and Neuroscience (www.lawneuro. org). ...
doi:10.1162/jocn_a_00920
pmid:26741803
fatcat:jd6ulu5lrzaancwyjm3t3len6a
Quantum Randomness in Cryptography—A Survey of Cryptosystems, RNG-Based Ciphers, and QRNGs
2022
Information
Even though the cryptographic algorithms are public and their strength depends on the keys, cryptoanalysis of encrypted ciphers can significantly contribute to the unveiling of the cipher's key. ...
, and the design of quantum random number generators (QRNGs). ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/info13080358
fatcat:c2wsomzpobbkvbwg46jcnfrhlq
Pan-Cancer Metabolic Signature Predicts Co-Dependency on Glutaminase and De Novo Glutathione Synthesis Linked to a High-Mesenchymal Cell State
2018
Cell Metabolism
predictive biomarkers of response to GLS1 inhibition d Signature predicts response in mesenchymal breast and lung tumors and across TCGA ...
Highlights d Dual role in energy and glutathione synthesis drives tumor GLS1 dependency d Cell line-derived diagnostic signature is predictive of GLS1 dependency in vivo d Glutamate and citrate are key ...
Using this dataset, we derive a pan-cancer diagnostic metabolic gene expression signature of GLS1/GCS co-dependency, test its predictive power in vivo, and analyze pan-cancer expression data from The Cancer ...
doi:10.1016/j.cmet.2018.06.003
pmid:30043751
fatcat:gbtqr7g47rhhfoyy4pe3qpxrwi
The taste of freedom: commensality, liminality, and return amongst Afghan transnational migrants in the UK and Pakistan
2014
Journal of the Royal Anthropological Institute
Picnic is picnic!’
A flavour of the past
When I remember the mountaintops of Pakhtunkhwa (my Afghan land), I forget the throne of Delhi. ...
The nexus of history, identity-formation, and travel entailed on chakar bears on Marsden’s analysis of the movements of Tajik and Afghan refugees moving around North Pakistan. ...
doi:10.1111/1467-9655.12115
fatcat:ricpmr3avjbd3darm5gt2ytthy
An overview of image steganography
2005
Information Security for South Africa
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. ...
Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. ...
to ensure the security of others.
6. ...
dblp:conf/issa/MorkelEO05
fatcat:ulgbiwkgqjgbbd46srwoqeawbq
Grassroots Environmental Activism in an Authoritarian Context: The Trees Movement in Vietnam
2017
VOLUNTAS - International Journal of Voluntary and Nonprofit Organizations
Yet, the majority of this literature has focused on the activities of NGOs. ...
The existing studies have linked the changes in civil society action to the changing dynamics of state-society relations in one-party-ruled Vietnam. ...
Voluntas
Compliance with Ethical Standards
Conflict of interest The author declares that there is no conflict of interest under any circumstances. ...
doi:10.1007/s11266-017-9829-1
fatcat:o62ypcgf7vaepib23dj5ngbcqu
« Previous
Showing results 1 — 15 out of 801 results