搜索结果: 1-15 共查到“latency”相关记录48条 . 查询时间(0.089 秒)
Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness
Distributed computing blockchains consensus protocols
2019/3/13
Synchronous solutions for building Byzantine Fault Tolerance (BFT) replication can be safe when < 1/2 of the replicas fail. Assuming ΔΔ is an upper bound on the time for messages to arrive, these solu...
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Lightweight cryptography MDS matrix Involutory matrix
2019/2/27
MDS matrices are important building blocks providing diffusion functionality for the design of many symmetric-key primitives. In recent years, continuous efforts are made on the construction of MDS ma...
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Bitcoin blockchain parallel composition
2018/11/21
Two of the most significant challenges in the design of blockchain protocols is increasing their transaction processing throughput and minimising latency in terms of transaction settlement. In this wo...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
secure computation multi-party computation (MPC) oblivious RAM (ORAM)
2018/4/17
Multi-Party Computation of Oblivious RAM (MPC ORAM) implements secret-shared random access memory in a way that protects access pattern privacy against a threshold of corruptions. MPC ORAM enables sec...
Oblivious RAM is a well-known cryptographic primitive to hide data access patterns. However, the best known ORAM schemes require a logarithmic computation time in the general case which makes it infea...
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
homomorphic encryption two-party secure computation convolutional neural networks
2018/1/19
The growing popularity of cloud-based machine learning raises a natural question about the privacy guarantees that can be provided in such a setting. Our work tackles this problem in the context where...
In this work, we introduce a generalized concept for low-latency masking that is applicable to any implementation and protection order, and (in its extremest form) does not require on-the-fly randomne...
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitch non-completeness threshold implementation
2017/12/19
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitc...
Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
Strong Anonymity Low Bandwidth
2017/9/29
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipien...
IPcore implementation susceptibility: A case study of Low latency ciphers
Side channel Attack Low latency Cipher Intellectual Property
2017/3/21
Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation met...
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
lightweight encryption low-latency tweakable block cipher
2016/6/29
We present a new tweakable block cipher family SKINNY, whose goal is
to compete with NSA recent design SIMON in terms of hardware/software performances,
while proving in addition much stronger secur...
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Side-Channel Analsysi Masking Threshold Implementation
2016/5/24
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are d...
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Tweakable Block Ciphers Almost MDS Matrices Even-Mansour Schemes
2016/5/9
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to ...
Speeding: On Low-Latency Key Exchange
Foundations low-latency key exchange zero-RTT protocols
2016/1/27
Low-latency key exchange (LLKE) protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protoc...