Zobrazeno 1 - 10
of 110
pro vyhledávání: '"Ricardo Dahab"'
Publikováno v:
Entropy, Vol 23, Iss 9, p 1108 (2021)
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring in
Externí odkaz:
https://doaj.org/article/e631469c77cf4090a94553d1dd16b5a4
Publikováno v:
IEEE Transactions on Reliability. :1-12
Autor:
Vitor Satoru Machi Matsumine, Félix Carvalho Rodrigues, Décio Gazzoni Filho, Caio Teixeira, Julio López, Ricardo Dahab
Publikováno v:
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022).
This paper focuses on the evaluation of different modular multiplication implementation techniques on 64-bit ARMv8 systems for the third-round NIST alternate candidate SIKE. The benchmarks were performed on four devices: an Orange Pi WinPlus featurin
Autor:
Jheyne N. Ortiz, Félix Carvalho Rodrigues, Décio Gazzoni Filho, Caio Teixeira, Julio López, Ricardo Dahab
Publikováno v:
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022).
This paper presents preliminary experimental results for the implementation of the third-round NIST finalists CRYSTALS-Kyber and Saber on the ARMv8 architecture. Our implementation uses NEON instructions to speed up key generation, encapsulation, and
Autor:
Léo Vieira Peres, Ricardo Dahab
Publikováno v:
Procedia Computer Science. 195:280-288
Publikováno v:
IEEE Transactions on Reliability. 68:1384-1403
The use of cryptography is nowadays common in software systems, with cryptographic libraries widely available to software developers. As such, the likely weakest link in sensitive software has moved from cryptographic function implementations to the
Publikováno v:
Entropy, Vol 23, Iss 1108, p 1108 (2021)
Entropy
Volume 23
Issue 9
Nayara Ortiz, J, Ricardo de Araujo, R, Aranha, D F, Rodrigues Costa, S I & Dahab, R 2021, ' The Ring-LWE Problem in Lattice-based Cryptography: The Case of Twisted Embeddings ', Entropy, vol. 23, no. 9, 1108 . https://doi.org/10.3390/e23091108
Entropy
Volume 23
Issue 9
Nayara Ortiz, J, Ricardo de Araujo, R, Aranha, D F, Rodrigues Costa, S I & Dahab, R 2021, ' The Ring-LWE Problem in Lattice-based Cryptography: The Case of Twisted Embeddings ', Entropy, vol. 23, no. 9, 1108 . https://doi.org/10.3390/e23091108
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring in
Publikováno v:
ACM Transactions on Mathematical Software. 45:1-35
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used to implement cryptosystems. In particular, the elliptic curves Curve2551
Publikováno v:
ICMLA
Cryptography is an essential aspect of software development. Nevertheless, software developers have limited knowledge of cryptography primitives, and support tools are limited. In this work, we present a comparison between graph embedding techniques,
Publikováno v:
Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020).
Cryptography is an indispensable tool for achieving security requirements such as software security. However, most software developers do not have enough knowledge regarding the proper use of cryptography and its APIs. This leads to incorrect use and