Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Anubhab Baksi"'
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-15 (2023)
Abstract In this paper, we propose an efficient quantum carry-lookahead adder based on the higher radix structure. For the addition of two n-bit numbers, our adder uses $$O(n)-O(\frac{n}{r})$$ O ( n ) - O ( n r ) qubits and $$O(n)+O(\frac{n}{r})$$ O
Externí odkaz:
https://doaj.org/article/18783496bef547e09d4dfffcf52e1f05
Publikováno v:
Mathematics, Vol 12, Iss 9, p 1337 (2024)
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estima
Externí odkaz:
https://doaj.org/article/7281c7133d5240e78984d405f192280a
Publikováno v:
IEEE Access, Vol 11, Pp 54175-54187 (2023)
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers ca
Externí odkaz:
https://doaj.org/article/8835f2ecc6d1456c9188a6a9cc8e996a
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 5156 (2023)
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions. Recently,
Externí odkaz:
https://doaj.org/article/23f09a1fdfb84dc9ad9d0f529dc35669
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 6, Iss 1, Pp 17-24 (2021)
Abstract As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things, there is a need to streamline the existing tools for better accuracy and ease of use, so that we can gauge the attacke
Externí odkaz:
https://doaj.org/article/da29f424a10d45cbb5cd823d74358ba7
Autor:
Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 2 (2022)
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there h
Externí odkaz:
https://doaj.org/article/042f7fa9b7d94577b0d3bfe84b76a70a
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 6, Iss 1, Pp 17-24 (2021)
As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things, there is a need to streamline the existing tools for better accuracy and ease of use, so that we can gauge the attacker's power
Publikováno v:
Journal of Cryptographic Engineering. 10:355-374
As fault-based cryptanalysis is becoming more and more of a practical threat, it is imperative to make efforts to devise suitable countermeasures. In this regard, the so-called “infective countermeasures” have garnered particular attention from t
Autor:
Anubhab Baksi
Publikováno v:
Computer Architecture and Design Methodologies ISBN: 9789811665219
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cb5dca4ec0f283ea158e8ee56a063f6a
https://doi.org/10.1007/978-981-16-6522-6_9
https://doi.org/10.1007/978-981-16-6522-6_9
Autor:
Anubhab Baksi
Publikováno v:
Computer Architecture and Design Methodologies ISBN: 9789811665219
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::759b7e36ffb928f6f3618b0155e2dbc3
https://doi.org/10.1007/978-981-16-6522-6_2
https://doi.org/10.1007/978-981-16-6522-6_2