Papers by Apostol Vassilev
Computer, 2018
The security of encrypted data depends not only on the theoretical properties of cryptographic pr... more The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.

The Computer Security Division (CSD) at the National Institute of Standards and Technology (NIST)... more The Computer Security Division (CSD) at the National Institute of Standards and Technology (NIST) promotes the security of implementations and operations of cryptographic primitives, such as signatures and encryption. This security depends not only on the theoretical properties of the primitives, but also on the abilities to withstand attacks on their implementations and to ensure authorized modes of operation. To advance this capability, NIST has initiated the NIST Threshold Cryptography Project to drive an effort to standardize threshold schemes. These schemes enable distribution of trust placed on human operators, and also offer a path to prevent single-points of failure at the technology level. They can be used to enhance the secrecy of cryptographic keys, as well as the integrity and availability of implemented primitives, including to provide resistance against side-channel attacks that exploit inadvertent leakage from real implementations.

43 The Computer Security Division at the National Institute of Standards and Technology 44 is int... more 43 The Computer Security Division at the National Institute of Standards and Technology 44 is interested in promoting the security of implementations of cryptographic primitives. This 45 security depends not only on the theoretical properties of the primitives but also on the ability 46 to withstand attacks on their implementations. It is thus important to mitigate breakdowns 47 that result from differences between ideal and real implementations of cryptographic algo48 rithms. This document overviews threshold cryptographic schemes, which enable attaining 49 desired security goals even if f out of n of its components are compromised. There is also 50 an identified potential in providing resistance against side-channel attacks, which exploit 51 inadvertent leakage from real implementations. Security goals of interest include the secrecy 52 of cryptographic keys, as well as enhanced integrity and availability, among others. 53 This document considers challenges and opportunities relat...

60 This document proposes a preliminary roadmap for the standardization of threshold schemes 61 f... more 60 This document proposes a preliminary roadmap for the standardization of threshold schemes 61 for cryptographic primitives by the National Institute of Standards and Technology (NIST). 62 To cover the large diversity of possible threshold schemes, as identified in the NIST Internal 63 Report (NISTIR) 8214, we tackle them in a structured way. We consider two main tracks 64 — single-device and multi-party — and within each of them we consider cryptographic 65 primitives in several possible threshold modes. The potential for real-world applications 66 is taken as an important motivating factor differentiating the pertinence of each possible 67 threshold scheme. Also, the standardization of threshold schemes needs to consider features 68 such as configurability of parameters, advanced security properties, testing and validation, 69 granularity (e.g., gadgets vs. composites) and specification detail. Overall, the organization 70 put forward enables us to solicit feedback useful to cons...

Certain commercial entities, equipment, or materials may be identified in this document in order ... more Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications.
(ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and ... more (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems.
(ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and ... more (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems.
Mathematical modelling, numerical techniques, and computer simulation of flows and transport in porous media
Method and System of Providing Security Services Using a Secure Device
Enforcing time-based transaction policies on devices lacking independent clocks
Nonoverlapping Domain Decomposition Algorithms with Inexact Subdomain Solves
Inexact Uzawa Algorithms for Symmetric and Nonsymmetric Saddle-Point Problems
ABSTRACT

Proceedings of the 2005 joint conference on Smart objects and ambient intelligence innovative context-aware services: usages and technologies - sOc-EUSAI '05, 2005
Advances in low power electronics and microsystems design open up the possibility to power small ... more Advances in low power electronics and microsystems design open up the possibility to power small wireless sensor nodes thanks to energy scavenging techniques. Among the potential energy sources, we have focused on mechanical surrounding vibrations. To convert vibrations into electrical power we have chosen mechanical structures based on electrostatic transduction. Thanks to measurements and in agreement with recent studies [1], we have observed that most of surrounding mechanical vibrations occurs at frequencies below 100 Hz. We report here global simulations and designs of mechanical structures able to recover power over a large spectrum below 100 Hz. Contrary to existing structures tuned on a particular frequency [2], we have investigated conversion structures with a high electrical damping. Mathematica analytical models have been performed to determine the mechanical and electrical parameters that maximize the scavenged power for a wide number of applications. Two prototypes of mechanical structures have been designed.

this paper we present a variety of models in groundwater hydrology that have been used in compute... more this paper we present a variety of models in groundwater hydrology that have been used in computer simulation for design of remediation and clean-up technologies. We also discuss the important question of the choice of the approximation method for the corresponding mathematical problem. In fluid reservoirs (aquifer and petroleum reservoirs) there are two imperative practical requirements: the method should conserve the mass locally and should produce accurate velocities (fluxes) even for highly nonhomogeneous media with large jumps in the physical properties. This is the reason that the finite volume method with harmonic averaging of the coefficients has been very popular and successful in computer simulation of flows in porous media. However, when the problem requires accurate description of the topography and the hydrological structure, a more general technique based on the finite element approximation is needed. The mixed finite element method has these properties. Since its intr...
Method for Secure Delegation of Trust From A Security Device to a Host Computer Application for Enabling Secure Access to a Resource on the Web
This paper introduces a generalized authentication framework for smart cards. The framework abstr... more This paper introduces a generalized authentication framework for smart cards. The framework abstracts the authentication services on the card and allows flexible configuration of authentication policies and technologies. This paper also makes recommendations for extensions to current authentication APIs.

Mathematics of Computation
In this paper, we consider iterative algorithms of Uzawa type for solving linear nonsymmetric blo... more In this paper, we consider iterative algorithms of Uzawa type for solving linear nonsymmetric block saddle point problems. Specifically, we consider systems where the upper left block is invertable nonsymmetric linear operator with positive definite symmetric part. Such saddle point problems arise, for example, in certain finite element and finite difference discretizations of Navier--Stokes equations, Oseen equations, and mixed finite element discretization of second order convection-diffusion problems. We consider two algorithms which utilize an "incomplete " or "approximate" evaluation of the inverse of the operator in the upper left block. Convergence results for the inexact algorithms are established in appropriate norms. The convergence of one of the algorithms is shown without the assumption of a sufficiently accurate approximation to the inverse operator. The other algorithm is shown to converge provided that the approximation to the inverse of the upper ...
Taking White Hats to the Laundry: How to Strengthen Testing in Common Criteria
Entropy: Order out of disorder
Uploads
Papers by Apostol Vassilev