Technical University of Crete

Displaying 1-35 of 35 results

  • White Papers // Nov 2013

    Parallelizable and Authenticated Online Ciphers

    Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general-purpose CPUs or dedicated hardware. The authors propose the...

    Provided By Technical University of Crete

  • White Papers // Sep 2013

    On the Efficacy of Solving LWE by Reduction to Unique-SVP

    The authors present a paper of the concrete complexity of solving instances of the unique Shortest Vector Problem (uSVP). In particular, they study the complexity of solving the Learning With Errors (LWE) problem by reducing the Bounded-Distance Decoding (BDD) problem to uSVP and attempting to solve such instances using the...

    Provided By Technical University of Crete

  • White Papers // Aug 2013

    Bounds in Shallows and in Miseries

    Proving bounds on the Expected Differential Probability (EDP) of a characteristic over all keys has been a popular technique of arguing security for both block ciphers and hash functions. In fact, to a large extent, it was the clear formulation and elegant deployment of this very principle that helped rijndael...

    Provided By Technical University of Crete

  • White Papers // Apr 2013

    Towards Understanding the Known-Key Security of Block Ciphers

    Known-key distinguishers for block ciphers were proposed and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, the authors tackle this problem for the case of block ciphers based on ideal components such as...

    Provided By Technical University of Crete

  • White Papers // Mar 2013

    An SDRAM Controller for Real-Time Systems

    For real-time systems the authors need to statically determine Worst-Case Execution Times (WCET) of tasks to proof the schedulability of the system. To enable static WCET analysis, the platform needs to be time-predictable. The platform includes the processor, the caches, the memory system, the operating system, and the application software...

    Provided By Technical University of Crete

  • White Papers // Nov 2012

    Mixed-Integer Linear Programming in the Analysis of Trivium and Ktantan

    In this paper, the authors present a rather new approach to apply mixed-integer optimization to the cryptanalysis of cryptographic primitives. They focus on the stream cipher Trivium, that has been recommended by the eSTREAM stream cipher project, and the lightweight block cipher Ktantan. Using these examples they explain how the...

    Provided By Technical University of Crete

  • White Papers // Oct 2012

    The Hardness of the Functional Orientation 2-Color Problem

    The authors consider the Functional Orientation 2-Color problem, which was introduced by Valiant in his seminal paper on holographic algorithms. For this decision problem, Valiant gave a polynomial time algorithm for planar graphs of maximum degree 3, and showed that the problem is NP-complete for planar graphs of maximum degree...

    Provided By Technical University of Crete

  • White Papers // Oct 2012

    A Light-Weight Statically Scheduled Network-on-Chip

    For Chip Multi-Processor (CMP) systems used in real-time systems the authors need time-predictable processors, memories, and communication channels. For on-chip core-to-core communication, a Network-on-Chip (NoC) is a scalable solution. In order to build a time-predictable CMP, the NoC is Time-Division Multiplexed (TDM). This paper investigates how a light-weight, statically scheduled...

    Provided By Technical University of Crete

  • White Papers // Sep 2012

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications

    This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications with real-time security needs. The authors cipher, named PRINCE, allows encryption of data within one clock cycle with a very competitive chip area compared...

    Provided By Technical University of Crete

  • White Papers // Jul 2012

    An All-In-One Approach to Diffential Cryptanalysis for Small Block Ciphers

    The authors present a framework that unifies several standard differential techniques. This unified view allows users to consider many, potentially all, output differences for a given input difference and to combine the information derived from them in an optimal way. They then propose a new attack that implicitly mounts several...

    Provided By Technical University of Crete

  • White Papers // May 2012

    On the Distribution of Linear Biases: Three Instructive Examples

    Despite the fact that the authors evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the...

    Provided By Technical University of Crete

  • White Papers // May 2012

    Globally Reasoning About Localised Security Policies in Distributed Systems

    In this paper, the authors aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax, defined in detail in this...

    Provided By Technical University of Crete

  • White Papers // May 2012

    Open Design and Crowdsourcing: Maturity, Methodology and Business Models

    Take a look at the modern day products around user's that are of any significance in their life; unlike in previous generations, they will probably not understand how these products work and they would be incapable of producing or repairing such products. Though there are many views of product complexity,...

    Provided By Technical University of Crete

  • White Papers // Mar 2012

    A Statically Scheduled Time-Division-Multiplexed Network-on-Chip for Real-Time Systems

    In this paper, the authors explore the design of a circuit switched Network-on-Chip (NoC) based on Time-Division Multiplexing (TDM) for use in hard real-time systems. Previous work has primarily considered application-specific systems. The paper presented here targets general-purpose hardware platforms. The authors consider a system with IP-cores, where the TDM-NoC...

    Provided By Technical University of Crete

  • White Papers // Feb 2012

    Hardware Support for Safety-Critical Java Scope Checks

    Memory management in Safety-Critical Java (SCJ) is based on time bounded, non garbage collected scoped memory regions used to store temporary objects. Scoped memory regions may have different life times during the execution of a program and hence, to avoid leaving dangling pointers, it is necessary to check that reference...

    Provided By Technical University of Crete

  • White Papers // Feb 2012

    Worst-Case Execution Time Based Optimization of Real-Time Java Programs

    Standard compilers optimize execution time for the average case. However, in hard real-time systems the Worst-Case Execution Time (WCET) is of primary importance. Therefore, a compiler for real-time systems shall include optimizations that aim to minimize the WCET. One effective compiler optimization is method inlining. It is especially important for...

    Provided By Technical University of Crete

  • White Papers // Jun 2011

    Leros: A Tiny Microcontroller for FPGAs

    Leros is a tiny microcontroller that is optimized for current low-cost FPGAs. Leros is designed with a balanced logic to on-chip memory relation. The design goal is a microcontroller that can be clocked in about half of the speed a pipelined on-chip memory and consuming less than 300 logic cells....

    Provided By Technical University of Crete

  • White Papers // May 2011

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits. The best attack to date is a differential attack that breaks less than half of the rounds. In this paper, the authors will present a new attack called invariant subspace attack that...

    Provided By Technical University of Crete

  • White Papers // May 2011

    On the Design of Passive RFID Tags for ASK Modulation

    Design of passive UHF RFID tag for ASK modulation is investigated. It is shown that tag antenna structural mode strongly affects the tag's backscattered field, shaping the phase and magnitude of the modulated signal. In contrast to prior art, the proposed circuit design can manipulate the effects of the tag...

    Provided By Technical University of Crete

  • White Papers // Mar 2011

    Cryptanalysis of PRESENT-like Ciphers with Secret S-boxes

    In this paper the authors consider PRESENT-like ciphers in a similar manner. They focus on the settings where the S-boxes are key dependent, and repeated for every round. They break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results...

    Provided By Technical University of Crete

  • White Papers // Jan 2011

    Design Space Exploration of Object Caches with Cross-Profiling

    To avoid data cache trashing between heap-allocated data and other data areas, a distinct object cache has been proposed for embedded real-time java processors. This object cache uses high associativity in order to statically track different object pointers for Worst-Case Execution-Time (WCET) analysis. However, before implementing such an object cache,...

    Provided By Technical University of Crete

  • White Papers // Nov 2010

    Time-Predictable Chip-Multiprocessor Design

    Real-time systems need time-predictable platforms to enable static Worst-Case Execution Time (WCET) analysis. Improving the processor performance with superscalar techniques makes static WCET analysis practically impossible. However, most real-time systems are multi-threaded applications and performance can be improved by using several processor cores on a single chip. In this paper,...

    Provided By Technical University of Crete

  • White Papers // Nov 2010

    A UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation

    This paper presents a customized design of a UHF Radio Frequency IDentification (RFID) system to be installed at the Bank Of Cyprus Oncology Center (BOCOC) in Cyprus. This is a pilot project that aims at evaluating the effectiveness and overall benefits of UHF RFID technology in the healthcare sector. The...

    Provided By Technical University of Crete

  • White Papers // Oct 2010

    NoC-Based CSP Support for a Java Chip Multiprocessor

    In this paper, the authors examine the idea of implementing Communicating Sequential Processes (CSP) constructs on a Java embedded Chip Multi-Processor (CMP). The approach is intended to reduce the memory bandwidth pressure on the shared memory, by employing a dedicated Network-on-Chip (NoC). The presented solution is scalable and also specific...

    Provided By Technical University of Crete

  • White Papers // Jul 2010

    Design and Implementation of a Trust-Aware Routing Protocol for Large WSNs

    The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes...

    Provided By Technical University of Crete

  • White Papers // May 2010

    Evaluation of Restoration Mechanisms for Future Services Using Carrier Ethernet

    In this paper, the authors evaluate and classify future service according to their requirements for delay, loss and bandwidth. The most demanding services include IPTV in different forms, hence IPTV is used as a representative for future services. Carrier Ethernet technologies are introduced with special focus on its OAM functionalities,...

    Provided By Technical University of Crete

  • White Papers // Mar 2010

    Pseudo-Cryptanalysis of the Original Blue Midnight Wish

    The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organized by the U.S. National Institute of Standards and Technology (NIST). BMW was selected for the second round of the competition, but the algorithm was tweaked in a number of ways. In this paper the authors...

    Provided By Technical University of Crete

  • White Papers // Mar 2010

    Towards 100 Gigabit Carrier Ethernet Transport Networks

    Ethernet as a transport technology has, up to now, lacked the features such as network layer architecture, customer separation and manageability that carriers require for wide-scale deployment. However, with the advent of PBB-TE and TMPLS, it is now possible to use Ethernet as a transport technology, making the use of...

    Provided By Technical University of Crete

  • White Papers // Feb 2010

    Analysis of the Perceived VoIP Quality Under Various Wireless Network Conditions

    This paper focuses on the comparative statistical analysis of the performance of VoIP calls under various situations, namely, during a handover, under different background traffic conditions (normal and heavy traffic load/saturation conditions) at a wireless Access Point (AP). Using empirical-based measurements, it demonstrates that various network conditions exhibit distinct statistical...

    Provided By Technical University of Crete

  • White Papers // Feb 2010

    Evaluating the Efficiency of Shortcut Span Protection

    This paper presents a comparison of various recovery methods in terms of capacity efficiency with the underlying aim of reducing control plane load. In particular, a method where recovery requests are bundled towards the destination (shortcut span protection) is evaluated can compared against traditional recovery methods. The optimization model is...

    Provided By Technical University of Crete

  • White Papers // Jan 2010

    Querying XML Data With SPARQL

    SPARQL is today the standard access language for Semantic Web data. In the recent years XML databases have also acquired industrial importance due to the widespread applicability of XML in the Web. In this paper the authors present a framework that bridges the heterogeneity gap and creates an interoperable environment...

    Provided By Technical University of Crete

  • White Papers // Jan 2010

    Low-Latency Video Transmission Over High-Speed WPANs Based on Low-Power Compression

    In the last few years a number of high throughput Wireless Personal Area Networks (WPANs) have appeared, such as the IEEE 802.15.3c standard. These networks have low power data transmitters and throughput up to 6 Gigabit per second. Therefore, they can provide a transmission of high definition video from mobile...

    Provided By Technical University of Crete

  • White Papers // Oct 2009

    Backscattering Improvement of UHF RFID Tag Efficiency

    In this paper, a tag-load selection methodology is proposed for optimized tag-to-reader backscatter communication. Derivation of the method is based on antenna/communication theory and applies to any tag-antenna, including minimum scattering antennas as a special case. In contrast to what is commonly believed, it is shown that amplitude maximization of...

    Provided By Technical University of Crete

  • White Papers // Sep 2009

    Identity Metasystem in Location Based Persistent Authentication

    Persistent Authentication In Smart Environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more user-centric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user...

    Provided By Technical University of Crete

  • White Papers // Jul 2007

    A Constraint Logic Programming Framework for the Synthesis of Fault-Tolerant Schedules for Distributed Embedded Systems

    The authors present a Constraint Logic Programming (CLP) approach for synthesis of fault-tolerant hard real-time applications on distributed heterogeneous architectures. They address time-triggered systems, where processes and messages are statically scheduled based on schedule tables. They use process re-execution for recovering from multiple transient faults. They propose three scheduling approaches,...

    Provided By Technical University of Crete

  • White Papers // Jan 2010

    Querying XML Data With SPARQL

    SPARQL is today the standard access language for Semantic Web data. In the recent years XML databases have also acquired industrial importance due to the widespread applicability of XML in the Web. In this paper the authors present a framework that bridges the heterogeneity gap and creates an interoperable environment...

    Provided By Technical University of Crete

  • White Papers // Feb 2010

    Analysis of the Perceived VoIP Quality Under Various Wireless Network Conditions

    This paper focuses on the comparative statistical analysis of the performance of VoIP calls under various situations, namely, during a handover, under different background traffic conditions (normal and heavy traffic load/saturation conditions) at a wireless Access Point (AP). Using empirical-based measurements, it demonstrates that various network conditions exhibit distinct statistical...

    Provided By Technical University of Crete

  • White Papers // Oct 2012

    The Hardness of the Functional Orientation 2-Color Problem

    The authors consider the Functional Orientation 2-Color problem, which was introduced by Valiant in his seminal paper on holographic algorithms. For this decision problem, Valiant gave a polynomial time algorithm for planar graphs of maximum degree 3, and showed that the problem is NP-complete for planar graphs of maximum degree...

    Provided By Technical University of Crete

  • White Papers // Jan 2010

    Low-Latency Video Transmission Over High-Speed WPANs Based on Low-Power Compression

    In the last few years a number of high throughput Wireless Personal Area Networks (WPANs) have appeared, such as the IEEE 802.15.3c standard. These networks have low power data transmitters and throughput up to 6 Gigabit per second. Therefore, they can provide a transmission of high definition video from mobile...

    Provided By Technical University of Crete

  • White Papers // May 2010

    Evaluation of Restoration Mechanisms for Future Services Using Carrier Ethernet

    In this paper, the authors evaluate and classify future service according to their requirements for delay, loss and bandwidth. The most demanding services include IPTV in different forms, hence IPTV is used as a representative for future services. Carrier Ethernet technologies are introduced with special focus on its OAM functionalities,...

    Provided By Technical University of Crete

  • White Papers // Feb 2010

    Evaluating the Efficiency of Shortcut Span Protection

    This paper presents a comparison of various recovery methods in terms of capacity efficiency with the underlying aim of reducing control plane load. In particular, a method where recovery requests are bundled towards the destination (shortcut span protection) is evaluated can compared against traditional recovery methods. The optimization model is...

    Provided By Technical University of Crete

  • White Papers // Mar 2010

    Towards 100 Gigabit Carrier Ethernet Transport Networks

    Ethernet as a transport technology has, up to now, lacked the features such as network layer architecture, customer separation and manageability that carriers require for wide-scale deployment. However, with the advent of PBB-TE and TMPLS, it is now possible to use Ethernet as a transport technology, making the use of...

    Provided By Technical University of Crete

  • White Papers // May 2012

    Globally Reasoning About Localised Security Policies in Distributed Systems

    In this paper, the authors aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax, defined in detail in this...

    Provided By Technical University of Crete

  • White Papers // Sep 2012

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications

    This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications with real-time security needs. The authors cipher, named PRINCE, allows encryption of data within one clock cycle with a very competitive chip area compared...

    Provided By Technical University of Crete

  • White Papers // May 2012

    On the Distribution of Linear Biases: Three Instructive Examples

    Despite the fact that the authors evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the...

    Provided By Technical University of Crete

  • White Papers // Nov 2012

    Mixed-Integer Linear Programming in the Analysis of Trivium and Ktantan

    In this paper, the authors present a rather new approach to apply mixed-integer optimization to the cryptanalysis of cryptographic primitives. They focus on the stream cipher Trivium, that has been recommended by the eSTREAM stream cipher project, and the lightweight block cipher Ktantan. Using these examples they explain how the...

    Provided By Technical University of Crete

  • White Papers // Jul 2012

    An All-In-One Approach to Diffential Cryptanalysis for Small Block Ciphers

    The authors present a framework that unifies several standard differential techniques. This unified view allows users to consider many, potentially all, output differences for a given input difference and to combine the information derived from them in an optimal way. They then propose a new attack that implicitly mounts several...

    Provided By Technical University of Crete

  • White Papers // Jul 2010

    Design and Implementation of a Trust-Aware Routing Protocol for Large WSNs

    The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes...

    Provided By Technical University of Crete

  • White Papers // Oct 2009

    Backscattering Improvement of UHF RFID Tag Efficiency

    In this paper, a tag-load selection methodology is proposed for optimized tag-to-reader backscatter communication. Derivation of the method is based on antenna/communication theory and applies to any tag-antenna, including minimum scattering antennas as a special case. In contrast to what is commonly believed, it is shown that amplitude maximization of...

    Provided By Technical University of Crete

  • White Papers // Nov 2010

    A UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation

    This paper presents a customized design of a UHF Radio Frequency IDentification (RFID) system to be installed at the Bank Of Cyprus Oncology Center (BOCOC) in Cyprus. This is a pilot project that aims at evaluating the effectiveness and overall benefits of UHF RFID technology in the healthcare sector. The...

    Provided By Technical University of Crete

  • White Papers // May 2011

    On the Design of Passive RFID Tags for ASK Modulation

    Design of passive UHF RFID tag for ASK modulation is investigated. It is shown that tag antenna structural mode strongly affects the tag's backscattered field, shaping the phase and magnitude of the modulated signal. In contrast to prior art, the proposed circuit design can manipulate the effects of the tag...

    Provided By Technical University of Crete

  • White Papers // Nov 2010

    Time-Predictable Chip-Multiprocessor Design

    Real-time systems need time-predictable platforms to enable static Worst-Case Execution Time (WCET) analysis. Improving the processor performance with superscalar techniques makes static WCET analysis practically impossible. However, most real-time systems are multi-threaded applications and performance can be improved by using several processor cores on a single chip. In this paper,...

    Provided By Technical University of Crete

  • White Papers // Mar 2013

    An SDRAM Controller for Real-Time Systems

    For real-time systems the authors need to statically determine Worst-Case Execution Times (WCET) of tasks to proof the schedulability of the system. To enable static WCET analysis, the platform needs to be time-predictable. The platform includes the processor, the caches, the memory system, the operating system, and the application software...

    Provided By Technical University of Crete

  • White Papers // Oct 2012

    A Light-Weight Statically Scheduled Network-on-Chip

    For Chip Multi-Processor (CMP) systems used in real-time systems the authors need time-predictable processors, memories, and communication channels. For on-chip core-to-core communication, a Network-on-Chip (NoC) is a scalable solution. In order to build a time-predictable CMP, the NoC is Time-Division Multiplexed (TDM). This paper investigates how a light-weight, statically scheduled...

    Provided By Technical University of Crete

  • White Papers // Mar 2012

    A Statically Scheduled Time-Division-Multiplexed Network-on-Chip for Real-Time Systems

    In this paper, the authors explore the design of a circuit switched Network-on-Chip (NoC) based on Time-Division Multiplexing (TDM) for use in hard real-time systems. Previous work has primarily considered application-specific systems. The paper presented here targets general-purpose hardware platforms. The authors consider a system with IP-cores, where the TDM-NoC...

    Provided By Technical University of Crete

  • White Papers // Feb 2012

    Worst-Case Execution Time Based Optimization of Real-Time Java Programs

    Standard compilers optimize execution time for the average case. However, in hard real-time systems the Worst-Case Execution Time (WCET) is of primary importance. Therefore, a compiler for real-time systems shall include optimizations that aim to minimize the WCET. One effective compiler optimization is method inlining. It is especially important for...

    Provided By Technical University of Crete

  • White Papers // Feb 2012

    Hardware Support for Safety-Critical Java Scope Checks

    Memory management in Safety-Critical Java (SCJ) is based on time bounded, non garbage collected scoped memory regions used to store temporary objects. Scoped memory regions may have different life times during the execution of a program and hence, to avoid leaving dangling pointers, it is necessary to check that reference...

    Provided By Technical University of Crete

  • White Papers // Jun 2011

    Leros: A Tiny Microcontroller for FPGAs

    Leros is a tiny microcontroller that is optimized for current low-cost FPGAs. Leros is designed with a balanced logic to on-chip memory relation. The design goal is a microcontroller that can be clocked in about half of the speed a pipelined on-chip memory and consuming less than 300 logic cells....

    Provided By Technical University of Crete

  • White Papers // Jan 2011

    Design Space Exploration of Object Caches with Cross-Profiling

    To avoid data cache trashing between heap-allocated data and other data areas, a distinct object cache has been proposed for embedded real-time java processors. This object cache uses high associativity in order to statically track different object pointers for Worst-Case Execution-Time (WCET) analysis. However, before implementing such an object cache,...

    Provided By Technical University of Crete

  • White Papers // Oct 2010

    NoC-Based CSP Support for a Java Chip Multiprocessor

    In this paper, the authors examine the idea of implementing Communicating Sequential Processes (CSP) constructs on a Java embedded Chip Multi-Processor (CMP). The approach is intended to reduce the memory bandwidth pressure on the shared memory, by employing a dedicated Network-on-Chip (NoC). The presented solution is scalable and also specific...

    Provided By Technical University of Crete

  • White Papers // Apr 2013

    Towards Understanding the Known-Key Security of Block Ciphers

    Known-key distinguishers for block ciphers were proposed and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, the authors tackle this problem for the case of block ciphers based on ideal components such as...

    Provided By Technical University of Crete

  • White Papers // Nov 2013

    Parallelizable and Authenticated Online Ciphers

    Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general-purpose CPUs or dedicated hardware. The authors propose the...

    Provided By Technical University of Crete

  • White Papers // Aug 2013

    Bounds in Shallows and in Miseries

    Proving bounds on the Expected Differential Probability (EDP) of a characteristic over all keys has been a popular technique of arguing security for both block ciphers and hash functions. In fact, to a large extent, it was the clear formulation and elegant deployment of this very principle that helped rijndael...

    Provided By Technical University of Crete

  • White Papers // Sep 2013

    On the Efficacy of Solving LWE by Reduction to Unique-SVP

    The authors present a paper of the concrete complexity of solving instances of the unique Shortest Vector Problem (uSVP). In particular, they study the complexity of solving the Learning With Errors (LWE) problem by reducing the Bounded-Distance Decoding (BDD) problem to uSVP and attempting to solve such instances using the...

    Provided By Technical University of Crete

  • White Papers // Mar 2010

    Pseudo-Cryptanalysis of the Original Blue Midnight Wish

    The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organized by the U.S. National Institute of Standards and Technology (NIST). BMW was selected for the second round of the competition, but the algorithm was tweaked in a number of ways. In this paper the authors...

    Provided By Technical University of Crete

  • White Papers // May 2011

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits. The best attack to date is a differential attack that breaks less than half of the rounds. In this paper, the authors will present a new attack called invariant subspace attack that...

    Provided By Technical University of Crete

  • White Papers // Mar 2011

    Cryptanalysis of PRESENT-like Ciphers with Secret S-boxes

    In this paper the authors consider PRESENT-like ciphers in a similar manner. They focus on the settings where the S-boxes are key dependent, and repeated for every round. They break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results...

    Provided By Technical University of Crete

  • White Papers // May 2012

    Open Design and Crowdsourcing: Maturity, Methodology and Business Models

    Take a look at the modern day products around user's that are of any significance in their life; unlike in previous generations, they will probably not understand how these products work and they would be incapable of producing or repairing such products. Though there are many views of product complexity,...

    Provided By Technical University of Crete

  • White Papers // Sep 2009

    Identity Metasystem in Location Based Persistent Authentication

    Persistent Authentication In Smart Environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more user-centric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user...

    Provided By Technical University of Crete

  • White Papers // Jul 2007

    A Constraint Logic Programming Framework for the Synthesis of Fault-Tolerant Schedules for Distributed Embedded Systems

    The authors present a Constraint Logic Programming (CLP) approach for synthesis of fault-tolerant hard real-time applications on distributed heterogeneous architectures. They address time-triggered systems, where processes and messages are statically scheduled based on schedule tables. They use process re-execution for recovering from multiple transient faults. They propose three scheduling approaches,...

    Provided By Technical University of Crete