Abstract: In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems
Crypto 2017 is the 37th International Cryptology Conference. It will be held at the University of California, Santa Barbara (UCSB) August 20-24 2017. The academic program covers all aspects of cryptology. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Computer Science Department of UCSB.
Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology should ensure the confidentiality, integrity and authenticity of their biometric assets. To manage security risk, biometric information should be protected from unauthorized access and modification. * The
NIST-approved cryptographic standards were designed to perform well on general-purpose computers. In recent years, there has been increased deployment of small computing devices that have limited resources with which to implement cryptography. When current NIST-approved algorithms can be engineered to fit into the limited resources of constrained
The case for using a blockchain boils down to a concept in computer security known as “information integrity.”
The FBI and Apple could be heading for a new fight over access to a dead terrorist's iPhone.
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was,
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.
NIST SP 800-185 specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security level. cSHAKE is a customizable variant of the SHAKE function, as defined in FIPS 202. KMAC (for KECCAK Message Authentication Code) is a pseudorandom function and keyed hash function based on KECCAK.
Side Channel Analysis (SCA) is a method by which an adversary can gather information about cryptographic keys by examining the physical environment surrounding the microprocessor while it is performing cryptographic operations. In this article, we present our research which is focused upon devising methods to increase the difficulty of conducting SCA