consider a 255-bit curve proposed by Bernstein known as Curve25519, which has also been adopted by the IETF. We optimize the X25519 key-exchange protocol proposed by Bernstein in 2006 for AVR ATmega 8-bit microcontrollers, MSP430X 16-bit microcontrollers, and for ARM Cortex-M0 32-bit microcontrollers. Our software for the AVR takes only 13,900,397 cycles for the computation of a Diffie-Hellman shared secret, and is the first to perform this computation in less than a second if clocked at 16 MHz for a security level of 128 bits. Our MSP430X software computes a shared secret in 5,301,792 cycles on MSP430X microcontrollers that have a 32-bit hardware multiplier and in 7,933,296 cycles on MSP430X microcontrollers that have a 16-bit multiplier. It thus outperforms previous constant-time ECDH software at the 128-bit security level on the MSP430X by more than a factor of 1.2 and 1.15, respectively. Our implementation on the Cortex-M0 runs in only 3,589,850 cycles and outperforms previous 128-bit secure ECDH software by a factor of 3.
A guest takes a sip of wine, and puckers his lips as he puts the glass back down. An art expert claims in court that a recently discovered oil painting was not by Leonardo da Vinci. An international board of accountants suggests entering assets at their market value in the balance sheets of companies. All three cases involve acts of valuation. The wine taster, amateur or professional, signals the discovery of a surprisingly good wine, connoisseurs perform as arbiters of attribution to the work of a famous painter, and auditors have discretion in deciding which technique of estimating the present value of a firm's assets will be applied. All three cases involve uncertainty: something new is entering the world, and someone, or some group in society has to determine its worth, its dangers, and its potential. The new vintage has its distinct taste; the attribution of the discovered painting to Leonardo's hand remains speculative; the estimation of an asset's "fair value" accounts for unforeseen changes of worth since its acquisition.Is there comparability in these cases of valuation? And if so, what do we discover about the failure and the success of innovations?As modern society transforms itself into a society of continuous self-change, the scope for innovation widens to all processes that introduce something new. A very broad definition of innovation is needed to capture cases as diverse as the shapes of specific synthesizer sounds to new labor market policies, or from a new fashionable style of painting to the invention of a mathematical proof. New products, styles and practices come to be selected and positioned as 6 valuable in communities, organizations and markets. This process is by no means trivial. In order to enter a social world of meaning, the unknown item must be recognized as new (Hutter et al. 2010). The quality of newness moves into the focus of research: How is it that an established understanding of that which is common can be interrupted by something, which then is recognized and evaluated as new by some group of arbiters? The challenge is to understand in greater detail the dynamics of social innovation, in their trajectories from situations of initial dissonance to the moments of valuation during which the new is confronted with the value scales of the established world.In the social sciences, valuation made its first major appearance through John Dewey who demonstrated that value is a quality that has to be performed. The concrete action and practice of art criticism, for example, is a form of valuation (Dewey 1934: 309-25). Both artists and beholders are able to abstract that which is significant (Dewey 1934: 54; see also Muniesa 2011). He generalized these insights in later works (Dewey 1939(Dewey , 1943 This volume opens a wide spectrum of social change for observation, ranging from microscopic change through the appearance of new entertainment goods to macroscopic change through new technologies. The authors seek out situations that bring an entire episode, from dissonance to valuation, i...
This paper presents new speed records for multiprecision multiplication on the AVR ATmega family of 8-bit microcontrollers. For example, our software takes only 1998 cycles for the multiplication of two 160-bit integers; this is more than 14% faster than previous results. For 256-bit inputs, our software is not only the first to break through the 6000-cycle barrier; with only 4797 cycles it also breaks through the 5000-cycle barrier and is more than 20% faster than previous work. We achieve these speed records by carefully optimizing the Karatsuba multiplication technique for AVR ATmega. One might expect that subquadratic-complexity Karatsuba multiplication is only faster than algorithms with quadratic complexity for large inputs. This paper shows that it is in fact faster than fully unrolled product-scanning multiplication already for surprisingly small inputs, starting at 48 bits. Our results thus make Karatsuba multiplication the method of choice for high-performance implementations of elliptic-curve cryptography on AVR ATmega microcontrollers.
In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel-a side channel that has been widely cited in literature but not well characterized yet. We investigate the leakage of processed data by passively measuring the dissipated heat of the devices. The temperature leakage is thereby linearly correlated with the power leakage model but is limited by the physical properties of thermal conductivity and capacitance. We further present heating faults by operating the devices beyond their specified temperature ratings. The efficiency of this kind of attack is shown by a practical attack on an RSA implementation. Finally, we introduce data remanence attacks on AVR microcontrollers that exploit the Negative Bias Temperature Instability (NBTI) property of internal SRAM cells. We show how to recover parts of the internal memory and present first results on an ATmega162. The work encourages the awareness of temperature-based attacks that are known for years now but not well described in literature. It also serves as a starting point for further research investigations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.