Learn More
After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz(More)
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this work, we argue that IBE is ideal for WSNs and vice versa. We discuss the(More)
The purpose of this study was to investigate the influence of chlorhexidine (CHX) concentration on the microtensile bond strength (muTBS) of contemporary adhesive systems. Eighty bovine central incisors were used in this study. The facial enamel surface of the crowns was abraded with 600-grit silicon carbide paper to expose flat, mid-coronal dentin(More)
The contents of this report are the sole responsibility of the authors. O conteúdo do presente relatório é de única responsabilidade dos autores. Abstract In this document we will give an introduction to lattice-based cryptography. Some mathematical apparatus will be presented to the reader and the main concepts are going to be pointed out. We will show how(More)
In this paper we present adaptive key recovery attacks on NTRU-based somewhat homo-morphic encryption schemes. Among such schemes, we study the proposal by Bos et al [BLLN13] in 2013. Given access to a decryption oracle, the attack allows us to compute the private key for all parameter choices. Such attacks show that one must be very careful about the use(More)
The contents of this report are the sole responsibility of the authors. O conteúdo do presente relatório é de única responsabilidade dos autores. Abstract In 2009, Gentry [Gen09b] constructed the first fully homomorphic encryption (FHE) scheme, solving a conjecture that remained open since 1978 when it was proposed by Dertouzos et al [RAD78]. The(More)
Root canal perforation and root resorption are challenging clinical conditions to correctly diagnose and treat, especially when they occur in anterior teeth. This clinical report describes the computed tomography findings, endodontic treatment, prosthetic rehabilitation, and clinical outcome of an iatrogenic root perforation and internal resorption in a(More)
In this paper we present a key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme proposed by Bos et al [BLLN13] in 2013. The attack allows us to compute the private key for t > 2 and when the private key is chosen with coefficients in {−1, 0, 1}. The efficiency of the attack is optimal since it requires just one(More)
OBJECTIVE The aim of this study to investigate the effects of different polymerization protocols on the cuspal movement in class II composite restorations. MATERIALS AND METHODS Human premolar teeth were prepared with class II cavities and then restored with composite and three-step and two-step etch-and-rinse adhesive systems under different curing(More)
  • 1