搜索结果: 1-8 共查到“军事学 Reverse-engineering”相关记录8条 . 查询时间(0.113 秒)
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering
Reverse-engineering Vector space search BCT
2019/5/21
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). Unfortunately, some algorithm designers exploit this fact to avoid providing the algorit...
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
side-channel analysis differential plaintext attack SCADPA
2018/3/5
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be impl...
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Hardware Reverse Engineering Hardware Trojans Hardware Trojan Detection
2017/8/21
Hardware manipulations pose a serious threat to numerous systems, ranging from myriads of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level,...
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
MD5 hash function cryptanalysis
2016/3/18
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Updat...
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
Reverse-Engineering S-Box Streebog Kuznyechik
2016/1/27
The Russian Federation’s standardization agency has recently
published a hash function called Streebog and a 128-bit block cipher
called Kuznyechik. Both of these algorithms use the same 8-bit S-Box...
Diffusion Programmable Device : The device to prevent reverse engineering
Reverse engineering Countermeasure Diffusion programmable device (DPD)
2016/1/25
The secret information, which is embedded in integrated circuit (IC) devices such as
a smart card, has the risk of theft by reverse engineering (RE). The circuit design of IC
can be stolen by the RE...
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Cache slices Intel last level cache,
2015/12/29
Dividing last level caches into slices is a popular method to prevent memory accesses from
becoming a bottleneck on modern multicore processors. In order to assess and understand the benefits
of cac...
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
S-box design criteria Skipjack linearity
2015/12/22
S-Boxes are the key components of many cryptographic primitives and designing them to improve resilience to attacks such as linear or differential cryptanalysis is well understood. In this paper, we i...