搜索结果: 1-15 共查到“LATENCY”相关记录48条 . 查询时间(0.046 秒)
Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness
Distributed computing blockchains consensus protocols
font style='font-size:12px;'>
2019/3/13
Synchronous solutions for building Byzantine Fault Tolerance (BFT) replication can be safe when < 1/2 of the replicas fail. Assuming ΔΔ is an upper bound on the time for messages to arrive, these solu...
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Lightweight cryptography MDS matrix Involutory matrix
font style='font-size:12px;'>
2019/2/27
MDS matrices are important building blocks providing diffusion functionality for the design of many symmetric-key primitives. In recent years, continuous efforts are made on the construction of MDS ma...
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Bitcoin blockchain parallel composition
font style='font-size:12px;'>
2018/11/21
Two of the most significant challenges in the design of blockchain protocols is increasing their transaction processing throughput and minimising latency in terms of transaction settlement. In this wo...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
font style='font-size:12px;'>
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
secure computation multi-party computation (MPC) oblivious RAM (ORAM)
font style='font-size:12px;'>
2018/4/17
Multi-Party Computation of Oblivious RAM (MPC ORAM) implements secret-shared random access memory in a way that protects access pattern privacy against a threshold of corruptions. MPC ORAM enables sec...
PRO-ORAM: Constant Latency Read-Only Oblivious RAM
PRO-ORAM ORAM
font style='font-size:12px;'>
2018/3/5
Oblivious RAM is a well-known cryptographic primitive to hide data access patterns. However, the best known ORAM schemes require a logarithmic computation time in the general case which makes it infea...
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
homomorphic encryption two-party secure computation convolutional neural networks
font style='font-size:12px;'>
2018/1/19
The growing popularity of cloud-based machine learning raises a natural question about the privacy guarantees that can be provided in such a setting. Our work tackles this problem in the context where...
Generic Low-Latency Masking
masking low latency AES hardware security
font style='font-size:12px;'>
2017/12/25
In this work, we introduce a generalized concept for low-latency masking that is applicable to any implementation and protection order, and (in its extremest form) does not require on-the-fly randomne...
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitch non-completeness threshold implementation
font style='font-size:12px;'>
2017/12/19
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitc...
Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
Strong Anonymity Low Bandwidth
font style='font-size:12px;'>
2017/9/29
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipien...
IPcore implementation susceptibility: A case study of Low latency ciphers
Side channel Attack Low latency Cipher Intellectual Property
font style='font-size:12px;'>
2017/3/21
Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation met...
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
lightweight encryption low-latency tweakable block cipher
font style='font-size:12px;'>
2016/6/29
We present a new tweakable block cipher family SKINNY, whose goal is
to compete with NSA recent design SIMON in terms of hardware/software performances,
while proving in addition much stronger secur...
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Side-Channel Analsysi Masking Threshold Implementation
font style='font-size:12px;'>
2016/5/24
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are d...
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Tweakable Block Ciphers Almost MDS Matrices Even-Mansour Schemes
font style='font-size:12px;'>
2016/5/9
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to ...
Speeding: On Low-Latency Key Exchange
Foundations low-latency key exchange zero-RTT protocols
font style='font-size:12px;'>
2016/1/27
Low-latency key exchange (LLKE) protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protoc...