cryptography

Cloud computing has become a relatively new paradigm for the delivery of compute re-
sources, with key management services (KMS) playing a crucial role in securely handling cryptographic
operations in the cloud. This paper presents the microbenchmark of cloud cryptographic workloads, in-
cluding SHA HMAC generation, AES encryption/decryption, ECC signature/verification, and RSA encryp-
tion/decryption, across Function-as-a-Service (FaaS) and Infrastructure-as-a-Service (IaaS) in conjunction

Categories:
42 Views

The detailed linear trails of CHAM are given.

In each file, you can find a linear trail and the correlation of it.

In a file named "LT_CHAM_64_xR_y.txt", an x-round linear trail with correlation 2^{-y} of CHAM with a block size of 64 bits is given.

In total, there are 44 linear trails of CHAM with a block size of 64 bits.

In a file named "LT_CHAM_128_xR_y.txt", an x-round linear trail with correlation 2^{-y} of CHAM with a block size of 128 bits is given.

In total, there are 54 linear trails of CHAM with a block size of 128 bits.

Categories:
26 Views

The data is a truth table of a 22-variable 4-resilient Boolean function with nonlinearity 2095616.

Categories:
131 Views