Search Results - "Gueron, Shay"
-
1
Selfie: reflections on TLS 1.3 with PSK
Published in Journal of cryptology (01-07-2021)“…TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed pre-shared key (PSK). The PSK is used to mutually authenticate the…”
Get full text
Journal Article -
2
How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?
Published in Journal of cryptology (2018)“…An oracle chooses a function f from the set of n bits strings to itself, which is either a randomly chosen permutation or a randomly chosen function. When…”
Get full text
Journal Article -
3
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Published in Cryptography (01-03-2022)“…This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm…”
Get full text
Journal Article -
4
Fast Garbling of Circuits Under Standard Assumptions
Published in Journal of cryptology (01-07-2018)“…Protocols for secure computation enable mutually distrustful parties to jointly compute on their private inputs without revealing anything, but the result…”
Get full text
Journal Article -
5
Using the New VPMADD Instructions for the New Post Quantum Key Encapsulation Mechanism SIKE
Published in 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH) (01-06-2019)“…This paper demonstrates the use of new processor instructions VPMADD, intended to appear in the coming generation of Intel processors (codename "Cannon Lake"),…”
Get full text
Conference Proceeding -
6
Key Management Systems at the Cloud Scale
Published in Cryptography (01-09-2019)“…This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and…”
Get full text
Journal Article -
7
Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm
Published in Information processing letters (01-07-2010)“…This paper describes a new method for efficient implementation of the Galois Counter Mode on general purpose processors. Our approach is based on three…”
Get full text
Journal Article -
8
The Sky Has Its Limits in COVID-19 Testing
Published in Rambam Maimonides medical journal (31-07-2020)“…At the time of writing, in July 2020, the COVID-19 pandemic has already inflicted dramatic international restrictions, including airports closing and limiting…”
Get full text
Journal Article -
9
Energetic Considerations of Ciliary Beating and the Advantage of Metachronal Coordination
Published in Proceedings of the National Academy of Sciences - PNAS (26-10-1999)“…The internal mechanism of cilia is among the most ancient biological motors on an evolutionary scale. It produces beat patterns that consist of two phases:…”
Get full text
Journal Article -
10
The Risk of Cancer Might be Lower Than We Think. Alternatives to Lifetime Risk Estimates
Published in Rambam Maimonides medical journal (29-01-2018)“…Estimates of lifetime cancer risk are commonly used in the clinical setting and in health-care evaluations. These measures are based on lifetime cancer risk…”
Get full text
Journal Article -
11
The Dynamics of Herds: From Individuals to Aggregations
Published in Journal of theoretical biology (01-09-1996)“…The dynamic behavior of small herds is investigated by means of simulations of two-dimensional discrete-stochastic models. An individual-based approach is used…”
Get full text
Journal Article -
12
The advantage of truncated permutations
Published in Discrete Applied Mathematics (15-05-2021)“…Constructing a Pseudo Random Function (PRF) is a fundamental problem in cryptology. Such a construction, implemented by truncating the last m bits of…”
Get full text
Journal Article -
13
Cilia Internal Mechanism and Metachronal Coordination as the Result of Hydrodynamical Coupling
Published in Proceedings of the National Academy of Sciences - PNAS (10-06-1997)“…We present a simple but realistic model for the internal bend-generating mechanism of cilia, using parameters obtained from the analysis of data of the beat of…”
Get full text
Journal Article -
14
53 Gbps Native (2 ^) ^ Composite-Field AES-Encrypt/Decrypt Accelerator for Content-Protection in 45 nm High-Performance Microprocessors
Published in IEEE journal of solid-state circuits (01-04-2011)“…Abstract-This paper describes an on-die, reconfigurable AES encrypt/decrypt hardware accelerator fabricated in 45 nm CMOS, targeted for content-protection in…”
Get full text
Journal Article -
15
Fast prime field elliptic-curve cryptography with 256-bit primes
Published in Journal of cryptographic engineering (01-06-2015)“…This paper studies software optimization of elliptic-curve cryptography with 256 -bit prime fields. We propose a constant-time implementation of the NIST and…”
Get full text
Journal Article -
16
A three–dimensional model for ciliary motion based on the internal 9 + 2 structure
Published in Proceedings of the Royal Society. B, Biological sciences (22-03-2001)“…Here we present, to our knowledge, the first modelling platform that enables simulations of three–dimensional (3D) motion of multicilia arrays at a detailed…”
Get full text
Journal Article -
17
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Published in Journal of cryptographic engineering (01-11-2019)“…The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based…”
Get full text
Journal Article -
18
The steady-state distributions of coagulation-fragmentation processes
Published in Journal of mathematical biology (13-07-1998)“…Coagulation-fragmentation processes arise in many scientific applications and have been studied extensively by means of deterministic approximations: integral…”
Get full text
Journal Article -
19
Randomness Tests in Hostile Environments
Published in IEEE transactions on dependable and secure computing (01-03-2018)“…An acceptable way to assess the quality of an RNG (PRNG) is to apply a standard battery of statistical randomness tests to a sampled output. Such tests compare…”
Get full text
Journal Article -
20
Fast polynomial inversion for post quantum QC-MDPC cryptography
Published in Information and computation (01-12-2021)“…New post-quantum Key Encapsulation Mechanism (KEM) designs, evaluated as part of the NIST PQC standardization Project, pose challenging tradeoffs between…”
Get full text
Journal Article