نتایج جستجو برای: leakage parameter

تعداد نتایج: 245023  

Journal: :IACR Cryptology ePrint Archive 2009
Joël Alwen Yevgeniy Dodis Daniel Wichs

We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parameter l. We construct a variety of leakage-resilient public-key systems including the first known identification schemes (ID), si...

2016
Yuanqu Qi Yuefeng Yu

A three-dimensional (3D) geometry model of twin screw expander has been developed in this paper to measure and analyze geometric parameters such as groove volume, suction port area, and leakage area, which can be described as functions of rotation angle of male rotor. Taking the suction loss, leakage loss, and real gas effect into consideration, a thermodynamic model is developed using continui...

Journal: :مکانیک سیالات و آیرودینامیک 0
اصغر دشتی رحمت آبادی محسن نکوئی مهر محمد سفید

in this paper, static performance characteristics for a finite lenght two-lobe journal bearing lubricated with micropolar fluid is studied. using finite element method, steady-state film pressure is obtained by solving modified reynolds equation, based on micropolar lubrication theory. with the help of film pressure in bearing, the static performance characteristics in terms of load carrying ca...

2016
Marcin Andrychowicz Stefan Dziembowski Sebastian Faust

The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the adversary. One of the main parameters for designing leakage resilient constructions is the leakage rate, i.e., a proportion between the amount of leaked information and the complexity of the computation carried out by the c...

2010
P. Lopes dos Santos T-P Azevedo-Perdicoúlis G. Jank J. A. Ramos J. L. Martins de Carvalho

A new approach to gas leakage detection in high pressure distribution networks is proposed, where two leakage detectors are modelled as a Linear Parameter Varying (LPV) system whose scheduling signals are, respectively, intake and offtake pressures. Running the two detectors simultaneously allows for leakage location. First, the pipeline is identified from operational data, supplied by REN-Gaso...

Journal: :IACR Cryptology ePrint Archive 2014
Melissa Chase Emily Shen

In this paper, we consider a setting where a user wants to outsource storage of a large amount of private data, and then perform pattern matching queries on the data; that is, given a data string s and a “pattern” string p, find all occurrences of p as a substring of s. We formalize the security properties desired in this type of setting by defining a type of encryption called queryable encrypt...

2013
Emmanuel Prouff Matthieu Rivain

Masking is a well-known countermeasure to protect block cipher implementations against side-channel attacks. The principle is to randomly split every sensitive intermediate variable occurring in the computation into d + 1 shares, where d is called the masking order and plays the role of a security parameter. Although widely used in practice, masking is often considered as an empirical solution ...

Journal: :IACR Cryptology ePrint Archive 2011
Yang Li Daisuke Nakatsu Qi Li Kazuo Ohta Kazuo Sakiyama

This paper presents a new side-channel attack technique called clockwise collision analysis. For the cryptographic implementations using synchronous digital circuit with a loop architecture, signal transitions as well as the side-channel leakage relates to not only the input data in the current cycle, but also the status in one-cycle before. The clockwise collision utilizes the fact that little...

2010
Shafi Goldwasser Guy N. Rothblum

We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage re...

2002
Yun Cao Hiroto Yasuura

This paper presents a system-level technique for embedded processor-based systems targeting both dynamic power and leakage power reduction using datapath width optimization. By means of tuning the design parameter, datapath width tailored to a given application requirements, the processors and memories are optimized resulting in significant power reduction, not only for dynamic power but also f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید