Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Michiel Van Beirendonck"'
Autor:
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware acceler
Externí odkaz:
https://doaj.org/article/ad97ff20864c4b7e9cceb6b4776a828c
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 2 (2022)
Checking the equality of two arrays is a crucial building block of the Fujisaki-Okamoto transformation, and as such it is used in several post-quantum key encapsulation mechanisms including Kyber and Saber. While this comparison operation is easy to
Externí odkaz:
https://doaj.org/article/08c69342dfce41e495774bff4246e0fe
Autor:
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing rese
Externí odkaz:
https://doaj.org/article/3cfe8bdcb938402d9db6c5b9b93e3636
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
In this work, we are concerned with the hardening of post-quantum key encapsulation mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation required for the Fujisaki-Okamoto (FO) transform. We identify critical vulnera
Externí odkaz:
https://doaj.org/article/672f31bbd8f9493bbc76c6af5f1b95a3
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking. Some masked implementations require conversion between these two variants, wh
Externí odkaz:
https://doaj.org/article/c4f7a509753f442b9597c12eced80ea8
ispartof: IEEE TRANSACTIONS ON COMPUTERS vol:72 issue:2 pages:321-332 status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a6a18b428a14da3e45d34442fce9348
https://lirias.kuleuven.be/handle/20.500.12942/721777
https://lirias.kuleuven.be/handle/20.500.12942/721777
Cryptocurrency mining is an energy-intensive process that presents a prime candidate for hardware acceleration. This work-in-progress presents the first coprocessor design for the ASIC-resistant CryptoNight-Haven Proof of Work (PoW) algorithm. We con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7bad0d114583f47739e6bb04264e934a
http://arxiv.org/abs/2212.05033
http://arxiv.org/abs/2212.05033
Autor:
Michiel Van Beirendonck, Josep Balasch, Ingrid Verbauwhede, Angshuman Karmakar, Jan-Pieter D'Anvers
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems
Accepted paper for the ACM- Journal on Emerging Technologies in Computing Systems, 2020 [Abstract]The candidates for theNIST Post-Quantum Cryptographystandardization have undergone extensive studies on efficiency and theoretical security, but researc
Autor:
Suparna Kundu, Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede, Angshuman Karmakar
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e7259400a3b483eb2c23e357bde11422
https://doi.org/10.1007/978-3-031-14791-3_5
https://doi.org/10.1007/978-3-031-14791-3_5
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
IACR Transactions on Cryptographic Hardware and Embedded Systems
IACR Transactions on Cryptographic Hardware and Embedded Systems
In this work, we are concerned with the hardening of post-quantum key encapsulation mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation required for the Fujisaki-Okamoto (FO) transform. We identify critical vulnera