Full-Size High-Security ECC Implementation on MSP430 Microcontrollers

Author(s):  
Gesine Hinterwälder ◽  
Amir Moradi ◽  
Michael Hutter ◽  
Peter Schwabe ◽  
Christof Paar
Keyword(s):  
2013 ◽  
Vol 5 (1) ◽  
pp. 36-41
Author(s):  
R. Ganesh ◽  
◽  
Ch. Sandeep Reddy ◽  

Alloy Digest ◽  
1997 ◽  
Vol 46 (2) ◽  

Abstract Lukens cold-work tool steels A2, D2, O1, S5, and S7 are used in applications where an air-hardening, oil-hardening, or shock-resisting tool steel is required. These steels are available in full-size, annealed plates suitable for saw cutting and/or finishing. Parts can subsequently be machined and heat treated to a range of hardness requirements. For improved internal cleanliness, all Lukens cold-work tool steels are produced with maximum sulfur levels of 0.010%. This datasheet provides information on composition. It also includes information on machining and joining. Filing Code: TS-550. Producer or source: Lukens Steel Company.


Author(s):  
R. A. Morozov ◽  
P. V. Trifonov

Introduction:Practical implementation of a communication system which employs a family of polar codes requires either to store a number of large specifications or to construct the codes by request. The first approach assumes extensive memory consumption, which is inappropriate for many applications, such as those for mobile devices. The second approach can be numerically unstable and hard to implement in low-end hardware. One of the solutions is specifying a family of codes by a sequence of subchannels sorted by reliability. However, this solution makes it impossible to separately optimize each code from the family.Purpose:Developing a method for compact specifications of polar codes and subcodes.Results:A method is proposed for compact specification of polar codes. It can be considered a trade-off between real-time construction and storing full-size specifications in memory. We propose to store compact specifications of polar codes which contain frozen set differences between the original pre-optimized polar codes and the polar codes constructed for a binary erasure channel with some erasure probability. Full-size specification needed for decoding can be restored from a compact one by a low-complexity hardware-friendly procedure. The proposed method can work with either polar codes or polar subcodes, allowing you to reduce the memory consumption by 15–50 times.Practical relevance:The method allows you to use families of individually optimized polar codes in devices with limited storage capacity. 


Author(s):  
Tomoya NAKAMURA ◽  
Yota TOGASHI ◽  
Kiwamu TSUNO ◽  
Noriyuki OKANO ◽  
Yukinori KOYAMA

2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Shufan Fei ◽  
Zheng Yan ◽  
Wenxiu Ding ◽  
Haomeng Xie

Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.


Author(s):  
Eleonora Porcu ◽  
Maria Lucrezia Tranquillo ◽  
Leonardo Notarangelo ◽  
Patrizia Maria Ciotti ◽  
Nilla Calza ◽  
...  

Abstract Purpose The main purpose and research question of the study are to compare the efficacy of high-security closed versus open devices for human oocytes’ vitrification. Methods A prospective randomized study was conducted. A total of 737 patients attending the Infertility and IVF Unit at S.Orsola University Hospital (Italy) between October 2015 and April 2020 were randomly assigned to two groups. A total of 368 patients were assigned to group 1 (High-Security Vitrification™ - HSV) and 369 to group 2 (Cryotop® open system). Oocyte survival, fertilization, cleavage, pregnancy, implantation, and miscarriage rate were compared between the two groups. Results No statistically significant differences were observed on survival rate (70.3% vs. 73.3%), fertilization rate (70.8% vs. 74.9%), cleavage rate (90.6% vs. 90.3%), pregnancy/transfer ratio (32.0% vs. 31.8%), implantation rate (19.7% vs. 19.9%), nor miscarriage rates (22.1% vs. 21.5%) between the two groups. Women’s mean age in group 1 (36.18 ± 3.92) and group 2 (35.88 ± 3.88) was not significantly different (P = .297). A total of 4029 oocytes were vitrified (1980 and 2049 in groups 1 and 2 respectively). A total of 2564 were warmed (1469 and 1095 in groups 1 and 2 respectively). A total of 1386 morphologically eligible oocytes were inseminated by intracytoplasmic sperm injection (792 and 594 respectively, P = .304). Conclusions The present study shows that the replacement of the open vitrification system by a closed one has no impact on in vitro and in vivo survival, development, pregnancy and implantation rate. Furthermore, to ensure safety, especially during the current COVID-19 pandemic, the use of the closed device eliminates the potential samples’ contamination during vitrification and storage.


Sign in / Sign up

Export Citation Format

Share Document