Narrow your search

Library

KU Leuven (4)

ULiège (3)

Groot Seminarie Brugge (1)

UGent (1)


Resource type

dissertation (8)


Language

English (4)

French (3)

Latin (1)


Year
From To Submit

2019 (1)

1994 (1)

1993 (1)

1986 (1)

1963 (1)

More...
Listing 1 - 8 of 8
Sort by

Dissertation
Sédimentologie rythmique des calcaires V2b de la région de Huy
Author:
Year: 1963

Loading...
Export citation

Choose an application

Bookmark

Abstract


Dissertation
Région limoneuse de Wavre : ferme de 85 ha : cultures pratiquées à justifier suivant les conditions économiques du moment : étudier cette ferme en ce qui concerne l'aménagement des bâtiments et l'outillage général pour réduire la main d'oeuvre.
Author:
Year: 1939 Publisher: [S.l. : chez l'auteur],

Loading...
Export citation

Choose an application

Bookmark

Abstract


Dissertation
Dissertatio inauguralis medica de scientiis medicinae adscitis.
Author:
Year: 1820 Publisher: Leodii : typis P.-J. Collardin,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Wheat straw as ruminant feed : effect of supplementation and ammonia treatment on voluntary intake and nutrient availability
Authors: ---
ISBN: 9054851783 Year: 1993 Publisher: Wageningen Landbouwuniversiteit Wageningen. Grafisch service centrum

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Restoration of bone stock with impacted cancellous allografts and cement in revision of the femoral component in total hip arthroplasty : a clinical and biomechanical study
Authors: ---
Year: 1994 Publisher: s. n. Leuven s.n.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
The psalm citations in the epistle to the Hebrews.
Authors: ---
Year: 1961 Publisher: Amsterdam Van Soest

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Inclusion de saccharomyces cerevisiae : modifications du taux de synthèse des enzymes glycolytiques
Authors: --- ---
Year: 1986

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Security of Cryptographic Implementations
Authors: --- --- ---
Year: 2019 Publisher: Leuven KU Leuven. Faculty of Engineering Science

Loading...
Export citation

Choose an application

Bookmark

Abstract

This thesis focuses on issues arising when implementing cryptography, specifically performance, side-channels and integration. All these issues must be addressed to turn a cryptographic algorithm into a practical system which can provide security properties such as confidentiality or authenticity.Considering the potential threat by quantum computers we deal with performance optimizations for supersingular isogeny Diffie-Hellman (SIDH).We compare different approaches for modular multiplication and show that Montgomery multiplication is theoretically the fastest and that product scanning is the fastest implementation. We also propose 2^391 19^88 – 1 and other primes suitable for SIDH which give an additional 12% speed-up. Further, we extend this comparison to Twisted Edwards curves with optimized addition chains and show that the increased flexibility in creating addition chains cannot compensate for the slower operations. Afterwards, practical performance improvements by using special multiplication instructions on ARM platforms are shown. Using these and an extended set of suitable primes gives a speed-up of 50%.We then consider a complete cryptographic system. We provide a security analysis of end-to-end encrypted email. It is shown how the complex behaviors of the components, when integrated into a single system, compromise or weaken security. Vulnerabilities are presented for 23 out of 35 tested S/MIME clients and 10 out of 28 tested OpenPGP clients. Finally, a side-channel attack on the Frodo scheme is presented. The attack can be performed with a single trace due to the reuse of secret values at multiple times during the algorithm. The attack extracts the key with probability 50%and 99% for parameter sets NIST1 and NIST2 respectively, also showing that it is more effective for supposedly more secure parameters. We also propose a mitigation with only minor impact on performance.

Keywords

Listing 1 - 8 of 8
Sort by