scholarly journals Pairing-Based Cryptography at High Security Levels

Author(s):  
Neal Koblitz ◽  
Alfred Menezes
2017 ◽  
Vol 7 (1.5) ◽  
pp. 230
Author(s):  
A. Murali ◽  
K Hari Kishore

Data manipulations are made with the use of communication and networking systems. But at the same time, data integrity is also a needed and important property that must be maintained in every data communicating systems. For this, the security levels are provided with cryptographic primitives like hash functions and block ciphers which are deployed into the systems. For efficient architectures, FPGA-based systems like AES-GCM and AEGIS-128 plays in the best part of the re-configurability, which supports the security services of such communication and networking systems. We possibly focus on the performance of the systems with the high security of the FPGA bit streams. GF (2128) multiplier is implemented for authentication tasks for high-speed targets. And also, the implementations were evaluated by using vertex 4.5 FPGA’s


2005 ◽  
Vol 15 (2) ◽  
pp. 249-291 ◽  
Author(s):  
KARL CRARY ◽  
ALEKSEY KLIGER ◽  
FRANK PFENNING

We explore the logical underpinnings of higher-order, security-typed languages with mutable state. Our analysis is based on a logic of information flow derived from lax logic and the monadic metalanguage. Thus, our logic deals with mutation explicitly, with impurity reflected in the types, in contrast to most higher-order security-typed languages, which deal with mutation implicitly via side-effects. More importantly, we also take a store-oriented view of security, wherein security levels are associated with elements of the mutable store. This view matches closely with the operational semantics of low-level imperative languages where information flow is expressed by operations on the store. An interesting feature of our analysis lies in its treatment of upcalls (low-security computations that include high-security ones), employing an “informativeness” judgment indicating under what circumstances a type carries useful information.


2018 ◽  
Vol 45 (4) ◽  
pp. 616-633 ◽  
Author(s):  
Henry Kin Shing Ng ◽  
Yee-Ling Hong ◽  
Tak Sang Chow ◽  
Angel Nga Man Leung

Humans become more prosocial after nature exposure. We proposed that the prosocial effect pertains to resource (e.g., food, water) and security (e.g., shelter, concealment) features in natural environments. Four studies tested the idea that prosociality changes with variations in environmental resource and security. Study 1 reported that urban greenspace, a resource feature to urban dwellers, predicted more volunteering in low-crime cities, but less so in high-crime cities. Studies 2 and 3 compared prosociality after exposure to natural sceneries in a Resource (high/low) × Security (high/low) design. Participants were more prosocial in the high-resource-high-security and low-resource-low-security conditions. Study 4 compared the four natural environments with two control conditions (urban, shape). It reported that not all natural environments led to higher prosociality, nor did any of them undermine prosociality. The findings supported heterogeneity in nature’s prosocial effect. Implications are discussed in relation to urban greening and the evolutionary basis of nature’s effect.


Sensors ◽  
2018 ◽  
Vol 19 (1) ◽  
pp. 15 ◽  
Author(s):  
Manuel Suárez-Albela ◽  
Paula Fraga-Lamas ◽  
Luis Castedo ◽  
Tiago Fernández-Caramés

Modern Internet of Things (IoT) systems have to be able to provide high-security levels, but it is difficult to accommodate computationally-intensive cryptographic algorithms on the resource-constrained hardware used to deploy IoT end nodes. Although this scenario brings the opportunity for using advanced security mechanisms such as Transport Layer Security (TLS), several configuration factors impact both the performance and the energy consumption of IoT systems. In this study, two of the most used TLS authentication algorithms (ECDSA and RSA) were compared when executed on a resource-constrained IoT node based on the ESP32 System-on-Chip (SoC), which was tested at different clock frequencies (80, 160 and 240 MHz) when providing different security levels (from 80 to 192 bits). With every tested configuration, energy consumption and average time per transaction were measured. The results show that ECDSA outperforms RSA in all performed tests and that certain software implementations may lead to scenarios where higher security-level alternatives outperform cryptosystems that are theoretically simpler and lighter in terms of energy consumption and data throughput. Moreover, the performed experiments allow for concluding that higher clock frequencies provide better performance in terms of throughput and, in contrast to what may be expected, less energy consumption.


2013 ◽  
Vol 5 (1) ◽  
pp. 36-41
Author(s):  
R. Ganesh ◽  
◽  
Ch. Sandeep Reddy ◽  

Objective. The purpose of the article is to compare the levels and mechanisms of food security management in Ukraine and Poland, to identify the main factors influencing the processes of its formation and to determine the directions of increasing the level of Ukraine food security. Methods. The scientific results of the study were obtained using the following methods: theoretical generalization and comparison (for the study of meaningful aspects of the definition of «food security»), analysis and synthesis (for comparative analysis of Ukraine and Poland food security levels), abstract-logical method (for establishing the links between the level of economic development of countries and the levels of their food security and determining the directions of increasing the Ukraine level of food security). Results. On the basis of a comparative analysis of Ukraine and Poland food security levels, a significant gap in Ukraine’s provision of food security has been identified. Thus, with respect to all food security components identified by FAO, except for the «use» of sanitary and safe drinking water, Poland has reached far ahead of Ukraine. It has been found that for the period 2012–2018, the value of the Global Food Security Index for Ukraine decreased by 2.1 due to a decrease in the level of affordability and availability of food, while the Polish side increased its position on GFSI by 2.8 due to the increase in affordability and availability of food in the country. It has been found that the decisive influence on the level of food security in Poland, as well as high ranking in the ranking is carried out by the EU Common Agricultural Policy (CAP), the implementation of the Polish Rural Development Program and significant public spending on agriculture. It has been determined that the main directions for improving the level of food security of Ukraine should be: lifting the moratorium on the sale of agricultural land; financing the agri-food sector not only through public spending but also through EU programs; creation and implementation of the National Rural Development Program; full and unconditional implementation of Government programs on EU integration; adaptation to the EU Common Agricultural Policy standards.


Sign in / Sign up

Export Citation Format

Share Document