Heterogeneous isolated execution for commodity gpus

I Jang, A Tang, T Kim, S Sethumadhavan… - Proceedings of the …, 2019 - dl.acm.org
Traditional CPUs and cloud systems based on them have embraced the hardware-based
trusted execution environments to securely isolate computation from malicious OS or …

A statistical method for robust 3D surface reconstruction from sparse data

V Blanz, A Mehl, T Vetter… - … Symposium on 3D Data …, 2004 - ieeexplore.ieee.org
General information about a class of objects, such as human faces or teeth, can help to
solve the otherwise ill-posed problem of reconstructing a complete surface from sparse 3D …

How to securely release unverified plaintext in authenticated encryption

E Andreeva, A Bogdanov, A Luykx, B Mennink… - … Conference on the …, 2014 - Springer
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes …

Improved masking for tweakable blockciphers with applications to authenticated encryption

R Granger, P Jovanovic, B Mennink… - … Conference on the Theory …, 2016 - Springer
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …

Performance evaluation of cryptographic algorithms over IoT platforms and operating systems

GCCF Pereira, RCA Alves, FL Silva… - Security and …, 2017 - Wiley Online Library
The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices
brings significant processing and energy consumption overheads. These overheads are …

Cryptanalysis of OCB2: attacks on authenticity and confidentiality

A Inoue, T Iwata, K Minematsu, B Poettering - Journal of Cryptology, 2020 - Springer
We present practical attacks on OCB2. This mode of operation of a blockcipher was
designed with the aim to provide particularly efficient and provably secure authenticated …

Boosting authenticated encryption robustness with minimal modifications

T Ashur, O Dunkelman, A Luykx - … , Santa Barbara, CA, USA, August 20 …, 2017 - Springer
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data
confidentiality and authenticity in the symmetric-key setting have existed for well over a …

Symmetric cryptography in javascript

E Stark, M Hamburg, D Boneh - 2009 Annual Computer …, 2009 - ieeexplore.ieee.org
We take a systematic approach to developing a symmetric cryptography library in Javascript.
We study various strategies for optimizing the code for the Javascript interpreter, and …

Online authenticated-encryption and its nonce-reuse misuse-resistance

VT Hoang, R Reyhanitabar, P Rogaway… - Advances in Cryptology …, 2015 - Springer
A definition of online authenticated-encryption (OAE), call it OAE1, was given by
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …

A Survey on Authenticated Encryption--ASIC Designer's Perspective

EB Kavun, H Mihajloska, T Yalcin - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to
provide confidentiality, integrity, and authenticity at the same time. Its use has soared in …