The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present the results of Single Event Effects (SEE) testing with high energy protons and with low and high energy heavy ions for electrical components considered for Low Earth Orbit (LEO) and for deep space applications.
As the development of a viable quantum computer nears, existing widely used public-key cryptosystems, such as RSA, will no longer be secure. Thus, significant effort is being invested into post-quantum cryptography (PQC). Lattice-based cryptography (LBC) is one such promising area of PQC, which offers versatile, efficient, and high performance security services. However, the vulnerabilities of these...
Lattice-based cryptography has gained credence recently as a replacement for current public-key cryptosystems, due to its quantum-resilience, versatility, and relatively low key sizes. To date, encryption based on the learning with errors (LWE) problem has only been investigated from an ideal lattice standpoint, due to its computation and size efficiencies. However, a thorough investigation of standard...
As cryptographic implementations are increasingly subsumed as functional blocks within larger systems on chip, it becomes more difficult to identify the power consumption signatures of cryptographic operations amongst other unrelated processing activities. In addition, at higher clock frequencies, the current decay between successive processing rounds is only partial, making it more difficult to apply...
Side channel attacks permit the recovery of the secret key held within a cryptographic device. This paper presents a new EM attack in the frequency domain, using a power spectral density analysis that permits the use of variable spectral window widths for each trace of the data set and demonstrates how this attack can therefore overcome both inter-and intra-round random insertion type countermeasures...
Radio Frequency IDentification (RFID) is a leading ubiquitous computing technology for the future. However, the rapid deployment of low-cost RFID tags in large scale raises significant personal privacy threats. Low-cost tags are extremely resource-constrained devices. Hence it is easy to corrupt a low-cost RFID tag to obtain useful information, trace its history and discover its identity. Therefore...
Side channel analysis and, in particular, differential power analysis (DPA) has become a prominent technique to attack cryptographic devices. This technique can be used to reveal the secret key stored in security devices by monitoring the power consumption of certain cryptographic algorithm operations and applying statistical processing. In this paper, an evaluation of power analysis attacks of the...
Electronic cryptographic devices can be attacked by monitoring physical characteristics released from their circuits, such as power consumption and electromagnetic emanation. These techniques are known as Side Channel Attacks (SCAs). Differential Power Analysis (DPA) is one of the most effective SCAs, which can reveal the secret key from the dependency between the power consumption of the device and...
Cryptographic devices with the Advanced Encryption Standard (AES) encryption algorithm are vulnerable to side channel attack, in particular, differential power analysis (DPA). Differential power analysis can be used to reveal the secret key in AES by monitoring the power consumption of the internal circuit and applying statistical processing. In this paper, an evaluation of power analysis attacks...
Cryptographic systems are being compromised by power analysis attacks. In this paper, a novel countermeasure technique against power analysis attacks is proposed which dynamically varies the clock when executing operations (making it difficult to correlate power traces in the time domain) and inserts dummy operations during idling clock cycles (reducing the signal-to-noise ratio of the useful information)...
Electronics cryptographic devices can be attacked by monitoring physical characteristics released from their circuits, such as power consumption and electromagnetic emanation. These techniques are known as Side Channel Attacks (SCAs). The Differential Power Analysis (DPA) is one of the most effective SCAs, which can reveal the secret key from the dependency between power consumption of the device...
This paper presents a scalable and flexible multi-core SoC architecture for high-speed key exchange for emerging IP security systems. Novel approaches are proposed for HMAC authentication block parallelization, distributed key handling and a pipelined block cipher design that allows feedback encryption modes. This improves upon previous state-of-the-art designs for IPSec, creating an architecture...
This paper proposes an improvement of a recently proposed semantic-based crossover, Semantic Similarity-based Crossover (SSC). The new crossover, called the Most Semantic Similarity-based Crossover (MSSC), is tested with Genetic Programming (GP) on a real world problem, as in predicting the tide in Venice Lagoon, Italy. The results are compared with GP using Standard Crossover (SC) and GP using validation...
Quantum-dot cellular automata (QCA) technology is a promising alternative to CMOS technology. QCA provides a novel paradigm both for communication and computation. Meanwhile, a new challenge referred to as the “layout = timing” problem is introduced due to the unique clocking and inherent pipeline nature of “wires” in QCA. As a result, feedback is intractable in sequential circuits due to the QCA...
The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper presents the full implementations of all of the second round candidates in hardware with all of their variants. In order to determine their computational efficiency, an important aspect in NIST's round two evaluation criteria, this paper...
Locality-how well neighbouring genotypes correspond to neighbouring phenotypes-has been described as a key element in Evolutionary Computation. Grammatical Evolution (GE) is a generative system as it uses grammar rules to derive a program from an integer encoded genome. The genome, upon which the evolutionary process is carried out, goes through several transformations before it produces an output...
We present an investigation into the genotype-phenotype map in Position Independent Grammatical Evolution (πGE). Previous studies have shown πGE to exhibit a performance increase over standard Grammatical Evolution (GE). The only difference between the two approaches is in how the genotype-phenotype mapping process is performed. GE uses a leftmost non terminal expansion, while πGE evolves the order...
Trade execution is concerned with the actual mechanics of buying or selling the desired amount of a financial instrument of interest. A practical problem in trade execution is how to trade a large order as efficiently as possible. A trade execution strategy is designed for this task to minimize total trade cost. Grammatical Evolution (GE) is an evolutionary automatic programming methodology which...
A key indicator of problem difficulty in evolutionary computation problems is the landscape's locality, that is whether the genotype-phenotype mapping preserves neighbourhood. In genetic programming the genotype and phenotype are not distinct, but the locality of the genotype-fitness mapping is of interest. In this paper we extend the original standard quantitative definition of locality to cover...
Power analysis is used to reveal the secret key of security devices by monitoring the power consumption of certain cryptographic algorithm operations through a statistical analysis approach known as Differential Power Analysis (DPA). Whilst this has been applied extensively to attacks on FPGA devices, there has been little research into attacks on ASIC devices. Although standard DPAs are essentially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.