Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Mateu, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.15426  [pdf

    cs.DL

    Mapping Literacies in the Tourism Labor Market: A Cross-Database Comparison

    Authors: Eddy Soria Leyva, Aida Valls Mateu, Ana Beatriz Hernandez Lara

    Abstract: This book chapter conducts a comparative bibliometric analysis of literacies in the tourism labor market, drawing from the Web of Science (WoS) and Scopus databases. The objective is to assess scientific outputs and identify key patterns of scientific collaboration. Findings suggest a statistically significant difference between the two databases with an overlap level of 35.71%. However, there is… ▽ More

    Submitted 9 September, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

  2. Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code

    Authors: Ferhat Erata, Ruzica Piskac, Victor Mateu, Jakub Szefer

    Abstract: Although cryptographic algorithms may be mathematically secure, it is often possible to leak secret information from the implementation of the algorithms. Timing and power side-channel vulnerabilities are some of the most widely considered threats to cryptographic algorithm implementations. Timing vulnerabilities may be easier to detect and exploit, and all high-quality cryptographic code today sh… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  3. arXiv:2202.04896  [pdf, other

    math.NT cs.CR

    Faulty isogenies: a new kind of leakage

    Authors: Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez

    Abstract: In SIDH and SIKE protocols, public keys are defined over quadratic extensions of prime fields. We present in this work a projective invariant property characterizing affine Montgomery curves defined over prime fields. We then force a secret 3-isogeny chain to repeatedly pass through a curve defined over a prime field in order to exploit the new property and inject zeros in the A-coefficient of an… ▽ More

    Submitted 27 February, 2022; v1 submitted 10 February, 2022; originally announced February 2022.

    Comments: Update: extended countermeasures

  4. arXiv:2201.05403  [pdf, ps, other

    cs.CR

    Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem

    Authors: Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Victor Mateu

    Abstract: In this paper, we study code-based signatures constructed from Proof of Knowledge (PoK). This line of work can be traced back to Stern who introduces the first efficient PoK for the syndrome decoding problem in 1993. Afterward, different variations were proposed in order to reduce signature's size. In practice, obtaining a smaller signature size relies on the interaction of two main considerations… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  5. arXiv:2009.00621  [pdf, other

    quant-ph cs.CR

    Quantum Search for Scaled Hash Function Preimages

    Authors: Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu

    Abstract: We present the implementation of Grover's algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation, and bitwise exclusive or. Our implementation provides the means to assess with precision the scaling of the number of gates and depth of a full-fledged quantum circuit designed to find the preimage… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

    Comments: 24 pages, 14 figures

  6. arXiv:1903.10212  [pdf, ps, other

    cs.IT

    Improved Veron Identification and Signature Schemes in the Rank Metric

    Authors: Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu

    Abstract: It is notably challenging to design an efficient and secure signature scheme based on error-correcting codes. An approach to build such signature schemes is to derive it from an identification protocol through the Fiat-Shamir transform. All such protocols based on codes must be run several rounds, since each run of the protocol allows a cheating probability of either 2/3 or 1/2. The resulting sign… ▽ More

    Submitted 19 April, 2019; v1 submitted 25 March, 2019; originally announced March 2019.