Zobrazeno 1 - 10
of 496
pro vyhledávání: '"Thomas Johansson"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the reference implementation of HQC. We build a cache-timing based distinguisher for implementing a plaintext-checking (PC) oracle. The PC oracle uses side-channel inf
Externí odkaz:
https://doaj.org/article/f4c180f4118b44d1897bc0f5fe21bcd5
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 3 (2022)
Firekite is a synchronous stream cipher using a pseudo-random number generator (PRNG) whose security is conjectured to rely on the hardness of the Learning Parity with Noise (LPN) problem. It is one of a few LPN-based symmetric encryption schemes, an
Externí odkaz:
https://doaj.org/article/9ac79bf155c84239ab61f9cf21383c18
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project. Our novel idea is to design an attack algorithm where we submit special ciphertext
Externí odkaz:
https://doaj.org/article/c98802874d9542969a35d1259fcad2f7
Publikováno v:
Social Sciences, Vol 12, Iss 7, p 417 (2023)
This study focuses on men undergoing androgen deprivation therapy (ADT) treatment for prostate cancer who also participated in an exercise programme as part of their rehabilitation. Our aim was twofold. First, we aimed to describe and analyse how the
Externí odkaz:
https://doaj.org/article/24d031e1f0b8408583315a79bd965592
Autor:
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 3 (2022)
Well before large-scale quantum computers will be available, traditional cryptosystems must be transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims to standardize suitable cryptographic schemes. Candidates are evaluated not
Externí odkaz:
https://doaj.org/article/ba9ed2fab6934332817b7933c1416030
Autor:
Christer Mattsson, Thomas Johansson
Publikováno v:
Journal for Deradicalization, Vol Fall, Iss 24, Pp 79-112 (2020)
This article explores the relationship between disengagement and deradicalization processes among 15 individuals who have left the neo-Nazi movement. The participants in this study were initially interviewed in 2015, and the interview process is stil
Externí odkaz:
https://doaj.org/article/cd103c671b724a9a87eab9c6a2820718
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 3 (2021)
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) attacks against the full version with complexities 2384 and 2378, respectively, and one distinguishing attack against a reduced variant with complexity
Externí odkaz:
https://doaj.org/article/7c3a79224af8464da07293d6d3bfb5b4
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the pro
Externí odkaz:
https://doaj.org/article/eb4eafa56e5e4a2f8e9a6b94b998a962
Autor:
Christer Mattsson, Thomas Johansson
Publikováno v:
Journal for Deradicalization, Vol Spring, Iss 18, Pp 185-216 (2019)
The purpose of this study is to contribute to the oral history of disengagement processes of former neo-Nazis in Sweden. The main aim is to take a holistic approach to their narratives. This means that these narratives need to be placed in relation t
Externí odkaz:
https://doaj.org/article/8c34e9f13ebf421a8fb50e946a3559c9
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with compl
Externí odkaz:
https://doaj.org/article/10617f3bd8b2475b8071c60c15bab10d