Search Results - "Gueron, Shay"

Refine Results
  1. 1

    Selfie: reflections on TLS 1.3 with PSK by Drucker, Nir, Gueron, Shay

    Published in Journal of cryptology (01-07-2021)
    “…TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed pre-shared key (PSK). The PSK is used to mutually authenticate the…”
    Get full text
    Journal Article
  2. 2

    How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function? by Gilboa, Shoni, Gueron, Shay, Morris, Ben

    Published in Journal of cryptology (2018)
    “…An oracle chooses a function f from the set of n bits strings to itself, which is either a randomly chosen permutation or a randomly chosen function. When…”
    Get full text
    Journal Article
  3. 3

    Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup by Gueron, Shay, Persichetti, Edoardo, Santini, Paolo

    Published in Cryptography (01-03-2022)
    “…This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm…”
    Get full text
    Journal Article
  4. 4

    Fast Garbling of Circuits Under Standard Assumptions by Gueron, Shay, Lindell, Yehuda, Nof, Ariel, Pinkas, Benny

    Published in Journal of cryptology (01-07-2018)
    “…Protocols for secure computation enable mutually distrustful parties to jointly compute on their private inputs without revealing anything, but the result…”
    Get full text
    Journal Article
  5. 5

    Using the New VPMADD Instructions for the New Post Quantum Key Encapsulation Mechanism SIKE by Kostic, Dusan, Gueron, Shay

    “…This paper demonstrates the use of new processor instructions VPMADD, intended to appear in the coming generation of Intel processors (codename "Cannon Lake"),…”
    Get full text
    Conference Proceeding
  6. 6

    Key Management Systems at the Cloud Scale by Campagna, Matthew, Gueron, Shay

    Published in Cryptography (01-09-2019)
    “…This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and…”
    Get full text
    Journal Article
  7. 7

    Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm by Gueron, Shay, Kounavis, Michael

    Published in Information processing letters (01-07-2010)
    “…This paper describes a new method for efficient implementation of the Galois Counter Mode on general purpose processors. Our approach is based on three…”
    Get full text
    Journal Article
  8. 8

    The Sky Has Its Limits in COVID-19 Testing by Linn, Shai, Tzafrir, Shay, Gueron, Shay

    Published in Rambam Maimonides medical journal (31-07-2020)
    “…At the time of writing, in July 2020, the COVID-19 pandemic has already inflicted dramatic international restrictions, including airports closing and limiting…”
    Get full text
    Journal Article
  9. 9

    Energetic Considerations of Ciliary Beating and the Advantage of Metachronal Coordination by Gueron, Shay, Levit-Gurevich, Konstantin

    “…The internal mechanism of cilia is among the most ancient biological motors on an evolutionary scale. It produces beat patterns that consist of two phases:…”
    Get full text
    Journal Article
  10. 10

    The Risk of Cancer Might be Lower Than We Think. Alternatives to Lifetime Risk Estimates by Grunau, Gilat L, Gueron, Shay, Pornov, Boris, Linn, Shai

    Published in Rambam Maimonides medical journal (29-01-2018)
    “…Estimates of lifetime cancer risk are commonly used in the clinical setting and in health-care evaluations. These measures are based on lifetime cancer risk…”
    Get full text
    Journal Article
  11. 11

    The Dynamics of Herds: From Individuals to Aggregations by Gueron, Shay, Levin, Simon A., Rubenstein, Daniel I.

    Published in Journal of theoretical biology (01-09-1996)
    “…The dynamic behavior of small herds is investigated by means of simulations of two-dimensional discrete-stochastic models. An individual-based approach is used…”
    Get full text
    Journal Article
  12. 12

    The advantage of truncated permutations by Gilboa, Shoni, Gueron, Shay

    Published in Discrete Applied Mathematics (15-05-2021)
    “…Constructing a Pseudo Random Function (PRF) is a fundamental problem in cryptology. Such a construction, implemented by truncating the last m bits of…”
    Get full text
    Journal Article
  13. 13

    Cilia Internal Mechanism and Metachronal Coordination as the Result of Hydrodynamical Coupling by Gueron, Shay, Levit-Gurevich, Konstantin, Liron, Nadav, Blum, Jacob J.

    “…We present a simple but realistic model for the internal bend-generating mechanism of cilia, using parameters obtained from the analysis of data of the beat of…”
    Get full text
    Journal Article
  14. 14

    53 Gbps Native (2 ^) ^ Composite-Field AES-Encrypt/Decrypt Accelerator for Content-Protection in 45 nm High-Performance Microprocessors by Mathew, S K, Sheikh, F, Kounavis, M, Gueron, S, Agarwal, A, Hsu, S K, Kaul, H, Anders, M A, Krishnamurthy, R K

    Published in IEEE journal of solid-state circuits (01-04-2011)
    “…Abstract-This paper describes an on-die, reconfigurable AES encrypt/decrypt hardware accelerator fabricated in 45 nm CMOS, targeted for content-protection in…”
    Get full text
    Journal Article
  15. 15

    Fast prime field elliptic-curve cryptography with 256-bit primes by Gueron, Shay, Krasnov, Vlad

    Published in Journal of cryptographic engineering (01-06-2015)
    “…This paper studies software optimization of elliptic-curve cryptography with 256 -bit prime fields. We propose a constant-time implementation of the NIST and…”
    Get full text
    Journal Article
  16. 16

    A three–dimensional model for ciliary motion based on the internal 9 + 2 structure by Gueron, Shay, Levit-Gurevich, Konstantin

    “…Here we present, to our knowledge, the first modelling platform that enables simulations of three–dimensional (3D) motion of multicilia arrays at a detailed…”
    Get full text
    Journal Article
  17. 17

    A toolbox for software optimization of QC-MDPC code-based cryptosystems by Drucker, Nir, Gueron, Shay

    Published in Journal of cryptographic engineering (01-11-2019)
    “…The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based…”
    Get full text
    Journal Article
  18. 18

    The steady-state distributions of coagulation-fragmentation processes by Gueron, Shay

    Published in Journal of mathematical biology (13-07-1998)
    “…Coagulation-fragmentation processes arise in many scientific applications and have been studied extensively by means of deterministic approximations: integral…”
    Get full text
    Journal Article
  19. 19

    Randomness Tests in Hostile Environments by Goll, Martin, Gueron, Shay

    “…An acceptable way to assess the quality of an RNG (PRNG) is to apply a standard battery of statistical randomness tests to a sampled output. Such tests compare…”
    Get full text
    Journal Article
  20. 20

    Fast polynomial inversion for post quantum QC-MDPC cryptography by Drucker, Nir, Gueron, Shay, Kostic, Dusan

    Published in Information and computation (01-12-2021)
    “…New post-quantum Key Encapsulation Mechanism (KEM) designs, evaluated as part of the NIST PQC standardization Project, pose challenging tradeoffs between…”
    Get full text
    Journal Article