189 research outputs found
A Machine-Checked Formalization of the Generic Model and the Random Oracle Model
Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on the computational cost of gaining information about the plaintext pertaining to a ciphertext without knowing the key. Such a view is permitted by the Generic Model and the Random Oracle Model which provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the proof assistant Coq, we provide a machine-checked account of the Generic Model and the Random Oracle Mode
A CFD validation roadmap for hypersonic flows
A roadmap for computational fluid dynamics (CFD) code validation is developed. The elements of the roadmap are consistent with air-breathing vehicle design requirements and related to the important flow path components: forebody, inlet, combustor, and nozzle. Building block and benchmark validation experiments are identified along with their test conditions and measurements. Based on an evaluation criteria, recommendations for an initial CFD validation data base are given and gaps identified where future experiments would provide the needed validation data
The Security of Elliptic Curve Cryptosystems - A Survey
Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then its2019; major cryptographic uses are given. These include its2019; use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed. It was found that ECC was well suited for low-power and resource constrained devices because of its2019; small key size
OpenDSU: Digital Sovereignty in PharmaLedger
Distributed ledger networks, chiefly those based on blockchain technologies,
currently are heralding a next generation of computer systems that aims to suit
modern users' demands. Over the recent years, several technologies for
blockchains, off-chaining strategies, as well as decentralised and respectively
self-sovereign identity systems have shot up so fast that standardisation of
the protocols is lagging behind, severely hampering the interoperability of
different approaches. Moreover, most of the currently available solutions for
distributed ledgers focus on either home users or enterprise use case
scenarios, failing to provide integrative solutions addressing the needs of
both.
Herein we introduce the OpenDSU platform that allows to interoperate generic
blockchain technologies, organised - and possibly cascaded in a hierarchical
fashion - in domains. To achieve this flexibility, we seamlessly integrated a
set of well conceived OpenDSU components to orchestrate off-chain data with
granularly resolved and cryptographically secure access levels that are nested
with sovereign identities across the different domains.
Employing our platform to PharmaLedger, an inter-European network for the
standardisation of data handling in the pharmaceutical industry and in
healthcare, we demonstrate that OpenDSU can cope with generic demands of
heterogeneous use cases in both, performance and handling substantially
different business policies. Importantly, whereas available solutions commonly
require a pre-defined and fixed set of components, no such vendor lock-in
restrictions on the blockchain technology or identity system exist in OpenDSU,
making systems built on it flexibly adaptable to new standards evolving in the
future.Comment: 18 pages, 8 figure
The Security of Elliptic Curve Cryptosystems - A Survey
Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then itsā major cryptographic uses are given. These include itsā use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed. It was found that ECC was well suited for low-power and resource constrained devices because of itsā small key size
- ā¦