196 research outputs found

    Les interventions infirmières permettant de prévenir le déclin fonctionnel chez les personnes âgées dans les milieux de soins aigus: une revue de littérature

    Get PDF
    Le vieillissement de la population est un phénomène qui ne cesse de s’accélérer depuis plusieurs années. La vieillesse entraîne une fragilité et une vulnérabilité qui, elles-mêmes, ont pour conséquence le déclin fonctionnel. L’hospitalisation en milieu de soins aigus chez les aînés est un facteur de risque du déclin fonctionnel qui peut s’observer lors de nouvelles problématiques concernant les activités de la vie quotidienne (AVQ) et les activités instrumentales de la vie quotidienne (AIVQ)

    Differenz – Ungleichheit – Soziale Arbeit

    Get PDF

    Utopie oder bald Realität? Bedingungsloses Grundeinkommen

    Get PDF

    Diskurstheorie

    Get PDF

    Verlernraum Rassismus: Ein exemplarischer Hochschulprozess

    Get PDF

    Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    Get PDF
    Abstract. Side-channel attacks are powerful techniques to attack imple-mentations of cryptographic algorithms by observing its physical param-eters such as power consumption and electromagnetic radiation that are modulated by the secret state. Most side-channel attacks are of divide-and-conquer nature, that is, they yield a ranked list of secret key chunks, e.g., the subkey bytes in AES. The problem of the key recovery is then to find the correct combined key. An optimal key enumeration algorithm (OKEA) was proposed by Charvil-lon et al at SAC’12. Given the ranked key chunks together with their probabilities, this algorithm outputs the full combined keys in the opti-mal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Espe-cially in the cases where the side-channel traces are noisy, the memory and running time requirements to find the right key can be prohibitively high. To tackle this problem, we propose a score-based key enumeration algo-rithm (SKEA). Though it is suboptimal in terms of the output order of cadidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time and memory. We also compare SKEA to the probabilistic key enumera-tion algorithm (PKEA) by Meier and Staffelbach and show its practical superiority in this case. SKEA is efficiently parallelizable. We propose a high-performance solu-tion for the entire conquer stage of side-channel attacks that includes SKEA and the subsequent full key testing, using AES-NI on Haswell Intel CPUs. 2 A. Bogdanov et al

    The Lane hash function

    Get PDF
    We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to be secure, easy to understand, elegant and flexible in implementation
    • …
    corecore