1 |
New RSA vulnerabilities using lattice reduction methodsMay, Alexander. January 2003 (has links) (PDF)
Paderborn, University, Diss., 2003.
|
2 |
Das Faktorisierungsrepräsentationsproblem als Basis kryptographischer ProtokolleFischlin, Roger. January 2002 (has links)
Frankfurt (Main), Universiẗat, Diss., 2002.
|
3 |
Implementation of RSA Cryptosystem for Next Generation RFID TagsDighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
|
4 |
Implementation of RSA Cryptosystem for Next Generation RFID TagsDighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
|
5 |
Implementation of RSA Cryptosystem for Next Generation RFID TagsDighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
|
6 |
Kombinationsträningseffekter på fysiologiska egenskaper relevanta för handbollsprestation på elitnivå. : En experimentell interventionsstudie på manliga elithandbollsspelare under tävlingssäsong. / In-season concurrent training effects on physiological capacities relevant for elite handball performance. : An experimental study on elite male handball playersBlomhage, Jonas January 2015 (has links)
Syfte och frågeställningar: Syftet med denna studie var att undersöka de fysiologiska effekterna av kombinationsträning, innefattande styrketräning, contrast complex training (CCT) kombinerat med intervallträning i form av upprepade kortare sprintar (ca 6 s) (RSE) eller längre (30 s) högintensiva intervaller (HIIT) hos handbollsspelare i herrelit, under tävlingssäsong. Metod: Under 12 veckor, i tävlingssäsong, genomförde 15 elithandbollsherrar, utöver sin vanliga handbollsträning antingen RSE (n=8) bestående av 10 repetitioner av shuttle sprintar (2 x 15 m) med start varje minut och med passiv vila eller HIIT (n=7) bestående av 5 reps av 30-s all-out sprintar med riktningsförändringar. Båda grupperna genomförde ocksåCCT bestående av 3 set med 3 övningar (3 x knäböj 90 % av 1RM, 6 x jump squat med 50 % av kroppsvikten, 6 x dropp jump från 30 cm Pre- och posttesterna inkluderade jump squat (JS) (RFD (Ns/kg)), 5 jump for distance test (5JT) (m), 30m sprint (5m (s), 20-30m (m/s), repeated shuttle sprint ability test (RSSA) (RSA Bäst, Sämst, Tot (s) samt beräknat trötthetindexFI (%), Sdec (%)), 1 RM knäböj (koncentrisk) (kg/kg kroppsvikt), Yo-Yo intermittent recovery test (YYIRT 1)(m) and maximal syreupptagningstest (VO2max) (l O2/min, ml·kg-0.75·min-1). Resultat: Båda grupperna ökade signifikant maxstyrkan i knäböj, RSE gruppen (8,8 %) mer än HITT (7,4 %) (p<0.01). I motsats visade HIIT gruppen större förbättringar i rate of force development (RFD) (63,3 %) än RSE (56,3 %) (p<0,05). VO2max ökade signifikant och likartat i båda grupperna (~2%). I testet för specifik uthållighet (YYIRD 1), var förbättringen i RSE gruppen 9,4 % jämfört med HIIT-gruppens 5,8 %. Både RSE (-5,7 %) och HIIT (-2 %) visade försämringar i acceleration (5 m sprint). Resultaten vid RSSA visade försämringar i alla komponenter i RSE gruppen. HITT gruppen förbättrade signifikantförmågan att motstå trötthet, Sdecvid RSA (39,1%) (p <0,09). Slutsats: CCT verkar vara en effektiv träningsmetod för att öka maximal styrka och RFD under tävlingssäsong men att den kanske inte positivt påverkar acceleration. HIIT kan vara en mer effektiv intervallträningsmetod (än RSE) för att bibehålla eller förbättra komponenter kopplade till RSA för elithandbollsherrar, under tävlingssäsong. Kombinationsträning med handboll, CCT och HIIT verkar inte innebära något motsatsförhållande för samtidig utveckling av maxstyrka, RFD, maximal löphastighet, hopp, VO2max eller specifik uthållighet. Sökord: intermittent idrott, Repeated sprint ability, Rate of force development. / Aim: The aim of this study was to investigate the effects of compact complex strength training (CCT) combined with interval training, either with short shuttle sprints (~6 s) in a repeated sprint exercise (RSE) or with longer all-out sprints (30 s) also involving change of direction in a high intensity interval training (HIIT), on handball related, in-season, physical performance in male elite players. MethodFor 12 weeks, in-season, 15 elite handball players performed, in addition to their normal handball training, either RSE (n = 8) sessions consisting of 10 repetitions of shuttle sprints (2x15m), start every 60 s and with passive recovery or HIIT (n = 7) consisting of 5 repetitions of 30-s all-out sprints with change of direction. Both groups also did CCT consisting of 3 sets of 3 exercises (3 x squat 90% of 1RM, 6 x jump squat 50% of the bodyweight and 6 x drop jump from 30 cm).. Pre- and posttests included jump squat (JS) (RFD (Ns/kg)), jump for distance test (5JT) (m), 30m sprint (5m (s), 20-30m (m/s)), repeated shuttle sprint ability test (RSSA) (RSA Best, Worst, Tot (s), FI (%), Sdec (%)), 1 RM squat (concentric) (kg/kg bodyweight), Yo-Yo intermittent recovery test (YYIRT 1) (m) and maximum oxygen test (VO2max) (l O2/min, ml·kg-0.75·min-1). Results: Both groups significantly (p<0.01) improved their maximum strength in squat, the RSE-group (8.8 %) more so than HIIT (7.4 %). In contrast the HIIT-group showed greater improvements in rate of force development (RFD) (63.5%) than RSE (56.3%) (p< 0.05). VO2max was significantly increased with similar gains in both groups (~2%). In the test for specific endurance, YYIRD1, the RSE-group’s improvement was 9.4 % compared with HIIT’s 5.8%. Both RSE (-5.7 %) and HIIT (-2%) groups showed decrements in acceleration (5 m sprint time). The results in the RSSA show decrements in all components in the RSE-group. HIIT’s significantly improved the ability to resist fatigue Sdec (29.1%) (p <0.09). Conclusion: CCT appear to be an effective in-season training method for gaining strength and RFD, but may not positively affect acceleration. HIIT may be a more effective interval training method (than RSE) for maintaining or improving components linking to RSA for elite male handball players during competition (match) season. Concurrent training of CCT and HIIT shows no interference in the development of strength, running speed, jump, RFD, VO2max or specific handball endurance. Keywords: Team sport, Repeated sprint ability, Rate of force development.
|
7 |
Implementation of RSA Cryptosystem for Next Generation RFID TagsDighe, Ashish Arun January 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
|
8 |
The Role of Respiratory Sinus Arrhythmia Reactivity on the Association between Childhood Adversity, Symptoms of Psychopathology, and Metabolic HealthO'Loughlin, Kerry 01 January 2020 (has links)
Extant literature suggests that experiences of childhood adversity put individuals at increased risk for deleterious emotional-behavioral and metabolic outcomes. However, the precise mechanisms through which early adversity confers risk for such outcomes remains poorly understood. Therefore, this project sought to examine the extent to which Respiratory Sinus Arrhythmia reactivity (RSA-R), a metric of Parasympathetic Nervous System functioning, influences the relationship between adversity exposure and metrics of emotional-behavioral and metabolic health during childhood. Based on prior literature, we hypothesized that RSA-R would significantly moderate the association between exposure to childhood adversity and both emotional-behavioral and metabolic health. This hypothesis was partially supported. Indeed, RSA-R interacted with experiences of childhood adversity to predict internalizing symptoms and metabolic dysfunction. The implications of these findings and directions for future research will be discussed.
|
9 |
Útoky na RSA založené na redukci mřížky / Attacks on RSA based on lattice reductionVaněček, Jaromír January 2018 (has links)
This thesis aims to describe in detail the Coppersmith's algorithm for fin- ding small solutions to polynomial congruences which is based on lattice basis reduction. This algorithm is a cornerstone of several attacks on the most wi- despread asymmetric cryptosystem RSA, therefore, next aim of the thesis is a description of selected attacks. As an important and current example, we can mention so-called ROCA attack which factorizes RSA modulus whenever the pri- mes are specifically crafted. At the end of the thesis, we implement both the Coppersmith's algorithm and the ROCA and several measurements and experi- ments are done. From the resulting data, one can deduce how the running time of the algorithm is affected by different parameters or what are the ideal values for these parameters in various situations. 1
|
10 |
Fault Injection Attacks on RSA and CSIDHChiu, TingHung 16 May 2024 (has links)
Fault injection attacks are a powerful technique that intentionally induces faults during computations to leak secret information. This thesis studies the fault injection attack techniques. The thesis first categorizes various fault attack methods by fault model and fault analysis and gives examples of the various fault attacks on symmetric key cryptosystems and public key cryptosystems. The thesis then demonstrates fault injection attacks on RSA-CRT and constant time CSIDH. The fault attack consists of two main components: fault modeling, which examines methods for injecting faults in a target device, and fault analysis, which analyzes the resulting faulty outputs to deduce secrets in each cryptosystem. The thesis aims to provide a comprehensive survey on fault attack research, directions for further study on securing real-world cryptosystems against fault injection attacks, testing fault injection attacks with RSA-CRT, and demonstrate and evaluate fault injection attacks on constant time CSIDH. / Master of Science / Fault injection attacks are attacks where the attackers intentionally induce the fault in the device during the operation to obtain or recover secret information. The induced fault will impact the operation and cause the faulty output, providing the information to attackers. Many cryptographic algorithms and devices have been proven vulnerable to fault injection attacks. Cryptography is essential nowadays, as it is used to secure and protect confidential data. If the cryptosystem is broken, many system today will be compromised. Thus, this thesis focus on the fault injection attacks on the cryptosystems. This thesis introduces the background of fault injection attacks, categorizes them into different types, and provides examples of the attacks on cryptosystems. The thesis studies how the attacks work, including how the attack induces the fault in the device and how the attack analyzes the fault output they obtained. Specifically, I examine how these attacks affect two commonly used encryption methods: symmetric key cryptography and public key cryptography. Additionally, I implement the fault injection attack on RSA-CRT and emph{Commutative Supersingular Isogeny Diffie-Hellman}~(CSIDH). This research aims to understand the potential attack method on different cryptosystems and can explore mitigation or protection in the future.
|
Page generated in 0.0422 seconds