1 |
Das Herz in der ägyptischen Literatur des zweiten Jahrtausends v. Chr. / The heart in Egyptian literature from the IIth century B.C.Toro Rueda, María Isabel 28 January 2004 (has links)
No description available.
|
2 |
A Side Channel Attack on a Higher-Order Masked Software Implementation of Saber / En Sidokanalsattack på en Högre-Ordnings Maskad Mjukvaruimplementation av SaberPaulsrud, Nils January 2022 (has links)
One of the key security aspects which must be evaluated for cryptosystems is their resistance against side-channel attacks. Masking is a commonly used countermeasure against side-channel attacks, in which the secret to be protected is partitioned into multiple shares using random “masks”. A k-order masked implementation uses k+1 shares. Masked implementations are available for the key encapsulation mechanism of Saber, a finalist in the NIST post-quantum cryptography standardization project. Though Saber has not been selected for standardization, it is similar to the selected CRYSTALS-Kyber, and may therefore have similar leakage. In this thesis, a side-channel attack against a higher-order masked implementation of Saber is attempted. A previous attack on first-order masked Saber using a deep learning-based approach is used as a starting point, though differences in the implementations make the attack not directly applicable to the higher-order case. A byte-wise leakage is found in the higher-order masked implementation, and two different attacks on this leakage point are considered. The first uses the Hamming weights of bytes and is able to recover Hamming weights of individual shares but not the complete message or secret keys from 2nd-order masked Saber. The other uses a method from a different previous side-channel attack in which message bytes are recovered using biased deep learning models. This method successfully recovers all message bytes from 1st-order masked Saber and is shown to successfully recover byte values from 2nd-order masked Saber by training multiple biased models and selecting the best performing models from these, though this also requires a much larger amount of attack data than the 1st-order masking case. This shows that a bytewise leakage in higher-order masked Saber can be exploited using a power analysis side-channel attack, though recovering the complete message and secret keys remains as future work. / En av de främsta säkerhetsaspekterna som måste utvärderas för krypteringsalgoritmer är resistens mot sidokanalsattacker. Maskning är en av de vanligaste åtgärderna för att skydda mot sidokanalsattacker, där känslig information partitioneras i flera delar med hjälp av slumpmässiga värden. En maskning av ordning k använder k+1 delar. Maskade implementationer finns tillgängliga för Saber, en av finalisterna NISTs postkvantkryptografiska standardiseringsprojekt. Saber har inte valts som standard, men har många likheter med den valda standarden CRYSTALS-Kyber och kan därför ha liknande sårbarheter. I detta examensarbete utförs en sidokanalsattack på en högre ordnings maskad implementation av Saber. En tidigare attack på första ordningens maskad Saber används som utgångspunkt, men skillnader i implementationen gör att denna attack inte kan användas direkt. Ett läckage på byte-nivå hittads i den högre ordnings maskade implementationen, och två olika attacker utförs. Den första, som använder Hammingvikten av en byte i meddelandet, kunde erhålla Hammingvikterna för individuella delar av det maskade meddelandet, men inte det ursprungliga meddelandet. Den andra attacken använder en metod från en tidigare sidokanalsattack där meddelanden kunde erhållas med hjälp av partiska djupinlärningsmodeller. Den här metoded kunde användas för att erhålla alla bytevärden från meddelandet med fösta ordningens maskning. Med betydligt mer data och genom att träna ett flertal djupinlärningsmodeller och sedan välja de bästa från bland dessa kunda även vissa bytevärden erhållas från andra ordningens maskning. Detta visar att denna svaghet på byte-nivå kan användas vid en attack på högre ordnings maskad Saber, men det återstår att extrahera hela meddelandet och hemliga nycklar.
|
3 |
Slope Stability Analysis Using the Kinematic Element MethodKader, Adnan January 2019 (has links)
Thesis regarding the application of the Kinematic Element Method to slope stability analysis in geotechnical engineering. / In this thesis, the effectiveness of the Kinematic Element Method (KEM), developed by Dr. Gussmann at the University of Stuttgart, was evaluated by comparing the solutions with the Limit Equilibrium Method (LEM), specifically the Morgenstern-Price method. The KEM was evaluated using a variety of problems, ranging from homogeneous slopes to retaining walls. The KEM was shown to predict similar potential failure mechanisms and values for the factor of safety (FS) as the Morgenstern-Price method. The FS were generally within the ±6% which is the range of variance for rigorous limit equilibrium methods. A simplified version of KEM (KEMv) was developed based on limit equilibrium formulations. In KEMv, an alternate iterative scheme to determine the FS is proposed, in which boundaries between elements are vertical. The KEMv provided similar values for the factor of safety and interelement forces as Gussmann’s KEM for vertical interelement boundaries given similar element locations. The KEM was assumed by Gussmann to be an upper bound solution. However, given the similarities in the solutions between KEM and KEMv, it may be a limit equilibrium method. The interelement forces from the KEM and KEMv were found to be sensitive to the location of the elements. Elements in the upper part of the slope often had small normal forces relative to shear forces, possibly being negative as well. Sensitivity analysis regarding the number of elements showed that a 5-element solution predicts the appropriate failure mechanism and provides a reasonably accurate FS. In a parametric study, slope geometry and soil properties were varied and comparisons were made between KEM and the Morgenstern-Price method. The KEMv displayed similar trends in factor of safety as the Morgenstern-Price method but predicted slightly larger values. The change in KEM critical slip surfaces with soil properties was consistent with trends predicted by Janbu’s dimensionless parameter. / Thesis / Master of Applied Science (MASc) / The stability of slopes is a challenging subject in geotechnical engineering. Geotechnical engineers are often interested in the factor of safety (FS), which is a quantitative measure of the stability of a slope. In this thesis, the effectiveness of the Kinematic Element Method (KEM) is evaluated by comparing its solutions to the Limit Equilibrium Method (LEM). The KEM was shown to predict similar potential failure mechanisms and values for the factor of safety. A simplified version of the KEM (KEMv) was developed based on LEM formulations. In KEMv, an alternate iterative scheme to determine the FS is proposed, in which the boundaries between elements are vertical. The KEMv provided similar values for the factor of safety and element forces as Gussmann’s KEM for vertical interelement boundaries. In a parametric study, KEM displayed similar trends in the change in FS and critical slip surface as the LEM.
|
Page generated in 0.0152 seconds