47 resultados para Time-memory attacks
Resumo:
This article will discuss notions and concepts of remembering in the aftermath of the Charlie Hebdo attacks. Much has been written about the immediate response to the attacks, both commending the collective spirit of unity that defined the ‘marche républicaine’ of 11 January 2015, and criticising the alleged hypocrisy and cynicism of, most notably, the political figures that took to the streets that day, hand in hand. I will consider a selection of the memory practices that have emerged since then, notably on the anniversary of the event. This demonstration of memory provides key insights into the form and manner of remembering within a particular cultural group, but also reflects how the present moment is integral to our understanding of memory. The purpose of this article is to consider how official and non-official remembering of Charlie Hebdo can intertwine as well as pull in separate directions. A focus on the politics, the language, the aesthetics and the geography of commemorative activities in this article will enable an appreciation of the multidirectional character of remembering Charlie Hebdo.
Resumo:
As the development of a viable quantum computer nears, existing widely used public-key cryptosystems, such as RSA, will no longer be secure. Thus, significant effort is being invested into post-quantum cryptography (PQC). Lattice-based cryptography (LBC) is one such promising area of PQC, which offers versatile, efficient, and high performance security services. However, the vulnerabilities of these implementations against side-channel attacks (SCA) remain significantly understudied. Most, if not all, lattice-based cryptosystems require noise samples generated from a discrete Gaussian distribution, and a successful timing analysis attack can render the whole cryptosystem broken, making the discrete Gaussian sampler the most vulnerable module to SCA. This research proposes countermeasures against timing information leakage with FPGA-based designs of the CDT-based discrete Gaussian samplers with constant response time, targeting encryption and signature scheme parameters. The proposed designs are compared against the state-of-the-art and are shown to significantly outperform existing implementations. For encryption, the proposed sampler is 9x faster in comparison to the only other existing time-independent CDT sampler design. For signatures, the first time-independent CDT sampler in hardware is proposed.