• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 33
  • 16
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 65
  • 19
  • 18
  • 16
  • 16
  • 16
  • 15
  • 10
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems

Ebeid, Nevine Maurice 04 1900 (has links)
It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that resulted in a random representation of the key known as the binary signed digit representation (BSD). We have discovered some interesting properties related to the number of possible BSD representations for an integer and we have proposed a different randomization algorithm. We have also carried our study to the $\tau$-adic representation of integers which is employed in elliptic curve cryptosystems (ECCs) using Koblitz curves. We have then dealt with another randomization countermeasure which is based on randomly splitting the key. We have investigated the secure employment of this countermeasure in the context of ECCs.
32

A comparison of circuit implementations from a security perspective

Sundström, Timmy January 2005 (has links)
In the late 90's research showed that all circuit implementations were susceptible to power analysis and that this analysis could be used to extract secret information. Further research to counteract this new threat by adding countermeasures or modifying the nderlaying algorithm only seemed to slow down the attack. There were no objective analysis of how different circuit implementations leak information and by what magnitude. This thesis will present such an objective comparison on five different logic styles. The comparison results are based on simulations performed on transistor level and show that it is possible to implement circuits in a more secure and easier way than what has been previously suggested.
33

Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems

Ebeid, Nevine Maurice 04 1900 (has links)
It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that resulted in a random representation of the key known as the binary signed digit representation (BSD). We have discovered some interesting properties related to the number of possible BSD representations for an integer and we have proposed a different randomization algorithm. We have also carried our study to the $\tau$-adic representation of integers which is employed in elliptic curve cryptosystems (ECCs) using Koblitz curves. We have then dealt with another randomization countermeasure which is based on randomly splitting the key. We have investigated the secure employment of this countermeasure in the context of ECCs.
34

A simple and low cost platform to perform Power Analysis Attacks

Carmona, Manuel Bejarano January 2012 (has links)
Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it varies with time. This leak- age is mainly used to deduce cryptographic keys as well as algorithms by direct observation of power traces. Power Analysis is a recent field of study that has been developed for the last decade. Since then, the techniques used have evolved into more complex forms, that some- times require a variety of skills that makes the subject difficult to start with. Nowadays it is changeling to tackle the problem without expen- sive equipment; what is more, the off-the-shelf solutions to do Power Analysis Attacks are rare and expensive. This thesis aim to provide a low cost and open platform as an entry point to Power Analysis for a price under 10 USD. Besides that, it is designed to be able to per- form Simple Power Analysis and Differential Power Analysis attacks to a 8 bit microcontroller, including the software needed to automate the process of taking the measurements. Finally, the platform can be extended to cover a wide range of microcontrollers, microprocessors and cryptographic devices by simple insertion in a bread board, which makes it the perfect device for new comers to the field.
35

Nestability spreje u trysek typu effervescent / Unsteadiness in sprays of effervescent atomizers

Beinstein, Zbyněk January 2009 (has links)
Master thesis focused on the research of the effervescent atomizers. Effervescent atomizers belong to a group of two-phase atomizers, which are often used in combustion applications. Right there in combustion applications, the degree of the stability sprays has a significant impact on combustion efficiency and exhaust gas emissions. The main aim of this work was to asses the level of spray unsteadiness depending on the atomizer design and its operating mode. The effect of construction was studied on the diameter and length of mixing chamber, and then on the size, number and location of aeration holes. Seventeen specific variants of the atomizer were constructed by different combinations of these design parameters. Each of these variants was measured in three operating modes, which were represented by a liquid pressure at the inlet to the atomizer and gas-to-liquid mass flow ratio (GLR). To evaluate the level of spray unsteadiness was used a methodology, which compares the ideal element´s distribution into the interparticle time bin, defined for the ideal (stable) spray, with the experimentally observed distribution. The laser measurement system P/DPA (Phase Doppler Particle Analyzer) was used to determine the experimental interparticle distribution. The result of the comparison of the ideal and the experimental distribution was the parameter , which expresses the level of spray unsteadiness for a specific atomizer and operating mode. With that parameter it was possible to compare the individual atomizers and determinate to the benefit of various construction´s correction of the atomizer. The results showed the recommendation for the modifications of the atomizer, creating a spray with a minimum level of spray´s unsteadiness. For the surveyed atomizer and his individual costruction´s variations the drawing was made.
36

REDUCED COMPLEMENTARY DYNAMIC AND DIFFERENTIAL CMOS LOGIC: A DESIGN METHODOLOGY FOR DPA RESISTANT CRYPTOGRAPHIC CIRCUITS

RAMMOHAN, SRIVIDHYA 03 July 2007 (has links)
No description available.
37

Design Methodology for Differential Power Analysis Resistant Circuits

Manchanda, Antarpreet Singh 21 October 2013 (has links)
No description available.
38

Long Chain n-3 PUFA and Oleic Acid Modification Strategies to Enhance Fillet Quality in Tilapia, Oreochromis species

Chu, Hyun Sik Stephano 26 May 2017 (has links)
Tilapia are freshwater fish that have become important in aquaculture and as a stable global source of seafood due to their ability to thrive in different environments. However, tilapia are sometimes considered nutritionally undesirable due to their high n-6 to n-3 fatty acid ratios. A market study was conducted first to determine fatty acid compositions in tilapia fillets in different US markets. Then a research was conducted to enhance nutritional value of tilapia by improving the n-3 and oleic acid contents in fish fillets without compromising fish growth or feed conversion ratios. Feeds were formulated with combinations of high and low n-6, n-3, and oleic acid levels using soybean oil, fish oil, algae oil, and high-oleic sunflower oil. Then 12 diets, including a commercial diet, were assigned to 24 tanks, each with 25 tilapia per tank. A Recirculating Aquaculture System (RAS) was used to grow the fish for 8 weeks. Fatty acid compositions of tilapia fillets were determined and samples were vacuum packed and stored at -10oC and -20oC to test oxidative degradation and fatty acid compositional changes. The market survey data showed that there were significant differences in fatty acid composition, lipid content, and n-6:n-3 fatty acid ratios depending on the country of origin. Samples from USA had ideal n-6:n-3 ratios (1.3 ±0.85) while samples from Southeast Asia had higher n-6:n-3 fatty acids ratio (6.6 ±0.54). Algae oil incorporation significantly increased DHA level while fish oil incorporation significantly increased both EPA and DPA. High-oleic sunflower oil based diets improved oleic acid levels and reduced linoleic acid compared to the soybean oil based diets. Sensory evaluation indicated that lipid source did not significantly impact preference or overall fillet quality, including texture. Interestingly, a survey showed people were interested in value-added tilapia, and would pay up to 30% more for nutritionally enhanced fish compared to the $5.00/lb fresh fillet price currently available in supermarkets. There was no observable oxidation during long term frozen storage. The oxidation study proved that value-addition would not be compromised during the long term storage conditions, even under temperature abuse. It is possible to improve tilapia nutritional quality through diet to provide consumers with value-added products that maintain quality during frozen storage. / Ph. D.
39

PET molecular imaging of peripheral and central inflammatory processes targeting the TSPO 18 kDa / Imagerie Moléculaire du processus inflammatoire périphérique et central par TEP des en ciblant le TSPO 18kDa

Bernards, Nicholas 01 October 2014 (has links)
L’objectif de la thèse: À ce jour, il est admis que la TSPO joue un rôle important dans le processus inflammatoire, et qu’il est possible de suivre sa présence à l’aide d’une variété de radiotraceurs adaptés. Les impacts de l’inflammation touchent un grand nombre de personnes à travers le monde pour diverses raisons ; c’est pourquoi, quoique le [ ¹ ⁸F]DPA-714 est très prometteur, il est nécessaire d’aller plus loin pour explorer ses capacités et ses applications possibles. L’inflammation a une forte incidence sur différentes maladies, par conséquent, à impact social élevé (comme la maladie inflammatoire de l’intestin (IBD), la neuroinflammation, et le choc septique). Dans ces modèles nous analyserons et quantifierons les niveaux de d’expression de TSPO 18kDa par imagerie TEP que nous comparerons au niveau exprimé trouvés chez des sujets contrôles. L’objectif étant de déterminer si la TSPO peut constituer une cible biologique d’intérêt pour l’évaluation et la quantification d’un état inflammatoire chez l’individu en utilisant l’imagerie TEP avec le radioligand [ ¹ ⁸F]DPA-714.Aperçu sur le travail de recherche : L’étude entreprise dans cette thèse a fourni des informations conduisant à la conclusion suivante : la TSPO 18kDa peut en effet être utile comme biomarqueur pour l’évaluation d’un état inflammatoire dans plusieurs maladies. Nous avons pu illustrer par l’intermédiaire de deux modèles de la maladie inflammatoire de l’intestin, un modèle de la neuroinflammation et un modèle de choc septique, que la TSPO est un indicateur du niveau de l’inflammation dans la zone affectée. De plus, nous avons pu suivre, mesurer et quantifier l’évolution d’une zone inflammée en fonction du temps.Bien que le [ ¹ ⁸F]DPA-714 est le traceur utilisé pour déterminer la présence et le niveau de l’inflammation, d’autres traceurs sont constamment en cours de développement. Cela est démontré par le travail de collaboration effectuée avec l’équipe de radiochimie, dans lequel nous avons illustré le potentiel d’un nouveau radioligand de TSPO, le [ ¹ ⁸F]DPA-C5yne. / Purpose : The purpose of this study was to determine the in vivo potential of the TSPO 18 kDa as a biomarker of inflammation, with the use of its radioligand [ ¹ ⁸F]DPA-714, to non-invasively quantify the inflammatory state within the scope of various pathologies. Procedure : Multiple animal models of various inflammatory diseases, to include : inflammatory bowel disease, neuroinflammation, and septic shock, were developed and put in place by adapted measures. The animals well-being and the subsequent inflammation was evaluated. The inflammatory state was measured using quantitative PET imaging with the TSPO radioligand [ ¹ ⁸F]DPA-714 and correlated to the expression of conventional inflammatory markers using microscopy. Results : Based on the observed data, we were able to distinguish control groups from treated groups when using [ ¹ ⁸F]DPA-714. This TSPO radioligand permitted us to quantify the inflammatory level and to observe evolutionary changes in the inflammatory state of the disease in multiple models. The PET results, using the [ ¹ ⁸F]DPA-714 signal was correlated with an increased TSPO expression at cellular level. Conclusion : Results indicate that [ ¹ ⁸F]DPA-714 is a suitable tracer for studying inflammation of multiple diseases.[ ¹ ⁸F]DPA-714 could be a good molecular probe to non-invasively evaluate the level and localization of inflammation. Moreover, in vivo imaging using this TSPO ligand is potentially a powerful tool to stage and certainly to follow the evolution and therapeutic efficiency at molecular level in inflammatory diseases.
40

Realizace útoku na maskovaný šifrovací algoritmus / Power analysis attack on masked AES implementation

Jakubíková, Radka January 2015 (has links)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.

Page generated in 0.0483 seconds