搜索结果: 1-15 共查到“军队指挥学 low-latency”相关记录15条 . 查询时间(0.047 秒)
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Lightweight cryptography MDS matrix Involutory matrix
2019/2/27
MDS matrices are important building blocks providing diffusion functionality for the design of many symmetric-key primitives. In recent years, continuous efforts are made on the construction of MDS ma...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
secure computation multi-party computation (MPC) oblivious RAM (ORAM)
2018/4/17
Multi-Party Computation of Oblivious RAM (MPC ORAM) implements secret-shared random access memory in a way that protects access pattern privacy against a threshold of corruptions. MPC ORAM enables sec...
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
homomorphic encryption two-party secure computation convolutional neural networks
2018/1/19
The growing popularity of cloud-based machine learning raises a natural question about the privacy guarantees that can be provided in such a setting. Our work tackles this problem in the context where...
In this work, we introduce a generalized concept for low-latency masking that is applicable to any implementation and protection order, and (in its extremest form) does not require on-the-fly randomne...
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitch non-completeness threshold implementation
2017/12/19
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitc...
Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
Strong Anonymity Low Bandwidth
2017/9/29
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipien...
IPcore implementation susceptibility: A case study of Low latency ciphers
Side channel Attack Low latency Cipher Intellectual Property
2017/3/21
Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation met...
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
lightweight encryption low-latency tweakable block cipher
2016/6/29
We present a new tweakable block cipher family SKINNY, whose goal is
to compete with NSA recent design SIMON in terms of hardware/software performances,
while proving in addition much stronger secur...
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Side-Channel Analsysi Masking Threshold Implementation
2016/5/24
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are d...
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Tweakable Block Ciphers Almost MDS Matrices Even-Mansour Schemes
2016/5/9
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to ...
Speeding: On Low-Latency Key Exchange
Foundations low-latency key exchange zero-RTT protocols
2016/1/27
Low-latency key exchange (LLKE) protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protoc...
A Low-Latency, Low-Area Hardware Oblivious RAM Controller
oblivous ram Path ORAM secure processors
2016/1/9
We build and evaluate Tiny ORAM, an Oblivious RAM prototype on FPGA. Oblivious RAM is a cryptographic primitive that completely obfuscates an application's data, access pattern and read/write behavior...
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
ECDSA signature verification NIST P-256
2016/1/6
Car-to-car and Car-to-Infrastructure messages exchanged in Intelligent Transportation Systems can
reach reception rates up to and over 1000 messages per second. As these messages contain ECDSA signat...
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
Low Latency High Bandwidth Anonymous Overlay Network Anonymous Routing
2009/7/1
Most existing anonymous networks focus on providing strong anonymity for the price
of having lower bandwidth, higher latency and degraded usability when compared with the conventional
use of the Int...