Search for: timing-characteristics
0.006 seconds

    Reliable hardware architectures for efficient secure hash functions ECHO and fugue

    , Article 15th ACM International Conference on Computing Frontiers, CF 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 204-207 ; 9781450357616 (ISBN) Mozaffari Kermani, M ; Azarderakhsh, R ; Bayat Sarmadi, S ; ACM Special Interest Group on Microarchitectural Research and Processing (SIGMICRO) ; Sharif University of Technology
    Association for Computing Machinery, Inc  2018
    In cryptographic engineering, extensive attention has been devoted to ameliorating the performance and security of the algorithms within. Nonetheless, in the state-of-the-art, the approaches for increasing the reliability of the efficient hash functions ECHO and Fugue have not been presented to date.We propose efficient fault detection schemes by presenting closed formulations for the predicted signatures of different transformations in these algorithms. These signatures are derived to achieve low overhead for the specific transformations and can be tailored to include byte/word-wide predicted signatures. Through simulations, we show that the proposed fault detection schemes are... 

    R2T-DSDN: reliable real-time distributed controller-based SDN

    , Article Journal of Supercomputing ; Volume 77, Issue 11 , 2021 , Pages 12420-12457 ; 09208542 (ISSN) Sedaghat, S ; Jahangir, A. H ; Sharif University of Technology
    Springer  2021
    Software-defined network (SDN) is an emerging network architecture in which the network control task is separated from packet forwarding. This architecture can be considered as a suitable infrastructure for fifth-generation mobile network (5G) and Internet of things due to its flexibility and dynamism. In real-time networks, time-sensitive packets that miss their deadlines are considered useless or less worthy. As with traditional networks, SDN is expected to support real-time communications and handle a variety of failures (including local controller, switch, and link failures) simultaneously. This study focuses on real-time communication of time-sensitive applications that operate on... 

    From continuous to quantized charging phenomena in few nanocrystals MOS structures

    , Article 11th International Autumn Meeting on Gettering and Defect Engineering in Semiconductor Technology, GADEST 2005, 25 September 2005 through 30 September 2005 ; Volume 108-109 , 2005 , Pages 25-32 ; 10120394 (ISSN); 9783908451136 (ISBN) Benassayag, G ; Shalchian, M ; Grisolia, J ; Bonafos, C ; Atarodi, S. M ; Claverie, A ; Pichaud B ; Claverie A ; Alquier D ; Richter H ; Kittler M ; Richter H ; Kittler M ; Sharif University of Technology
    Trans Tech Publications Ltd  2005
    In this paper, we present a study on the contribution of silicon nanocrystals to the electrical transport characteristics of large (100 µ x 100 µm) and small (100 nm x 100 nm) metaloxide- semiconductor (MOS) capacitors at room temperature. A layer of silicon nanocrystals is synthesized within the oxide of these capacitors by ultra-low energy ion implantation and annealing. Several features including negative differential resistance (NDR), sharp current peaks and random telegraph signal (RTS) are demonstrated in the current-voltage and current-time characteristics of these capacitors. These features have been associated to charge storage in silicon nanocrystals and to the resulting Coulomb... 

    Enhanced cache attack on AES applicable on ARM-based devices with new operating systems

    , Article Computer Networks ; Volume 198 , 2021 ; 13891286 (ISSN) Esfahani, M ; Soleimany, H ; Aref, M. R ; Sharif University of Technology
    Elsevier B.V  2021
    There are several key challenges in performing cache-based attacks on ARM-based devices. Lipp et al. introduced various techniques to tackle these challenges and applied successfully different cache-based attacks on ARM-based mobile devices. In the cache-based attacks proposed by Lipp et al. it is assumed that the attacker has access to the mapping of virtual addresses to physical addresses through/proc/self/pagemap which is an important limiting factor in Linux and newer versions of Android operating systems. To access this mapping, the attacker must know the root of the operating system. In this paper, we introduce an Evict+Reload attack on the T-table-based implementation of AES which...