- Full text PDF available (2)
We present masking countermeasure for mCrypton encryption algorithm. We constructed masked computational flow of mCrypton using developed provably secure masked basic operations. Results of hardware implementation of masked mCrypton processor show suitability of the masked mCrypton for resource-constrained devices.
In paper are described modern techniques to protection of databases, classical threats and ways of their elimination. The special attention is given to vulnerability assessment and intrusion detection systems. Are defined the simple and structured approaches to a safety of a DBMS.
As information hiding, the digital watermark techniques have been attracting more interests in both research and industrial fields. Relational database is widely used in many information systems, as a tool for storing and managing a data. Major issue to protect the copyright of relational data. In order to make watermarking information more intuitive and… (More)
This paper represents the mathematical background to estimate the secret information leakage risks during timing analysis the most general modern modular exponentiation methods. The comparison of the leakage risk of those methods has been done. Possible countermeasures to decrease the secret information leakage risk level have also been proposed.
This article deals with the RSA encryption algorithm. Its safety is analyzed using the number field sieve method. The algorithm work results allow to define a define a secret key in a simple way.
This work elucidates luminescence, chemiluminescence, importance of chemiluminescence assay and automation by applying the electronic devices. The operation factors and classifications are given. We studied the chemiluminometer components and abilities to control and operate by the electronic devices; the productions of different producers for… (More)