搜索结果: 1-15 共查到“军事学 combined”相关记录15条 . 查询时间(0.157 秒)
The Art of Guessing in Combined Side-Channel Collision Attacks
MDCCF distinguisher voting collision voting
2019/6/13
Recent combined collision attacks have shown promising results for exploiting side-channel leakage information from both divide-and-conquer and analytical distinguishers. However, divide-and-conquer d...
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Combined Security DPA DFA
2019/6/4
In order to thwart Differential Power Analysis (DPA) and Differential Fault Analysis (DFA) attacks, we require the implemented algorithm to ensure correct output and sensitive variable privacy. We pro...
ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
side-channel analysis fault injection countermeasure
2016/6/27
Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation. Hardening cryptographic implementations with appropriate countermeasures is thus essen...
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Grain stream cipher Differential Power Analysis Fault Attack Countermeasures
2015/12/29
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against the Grain family of stream ciphers (Grain v1 and Grain-128) by resynchronizing the cipher multiple ...
Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core pr...
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
side-channel attacks combined collision attacks linear collision attacks DPA AES
2010/11/22
The fundamental problem of extracting the highest possible amount of key-related information using the lowest possible number of measurements is central to side-channel attacks against embedded implem...
Tardos Fingerprinting Codes in the Combined Digit Model
Tardos Fingerprinting Codes Combined Digit Model colluders
2009/6/15
We introduce a new attack model for collusion secure codes, and analyze the collusion resistance of two
version of the Tardos code in this model, both for binary and non-binary alphabets. The model a...
Combined(identity-based)public key schemes
Combined public key scheme identity-based cryptography key separation
2009/6/9
Consider a scenario in which parties use a public key encryption
scheme and a signature scheme with a single public key/private key
pair—so the private key sk is used for both signing and decrypting...
A number p is a safe prime if both p and (p − 1)/2 are
prime. This note describes a method of generating safe primes that is
considerably faster than repeatedly generating random primes q unti...
Secure Group Communications over Combined Wired/Wireless Networks
Group key agreement combined wired/wireless networks mobile devices DDH assumption
2009/3/31
This paper considers the fundamental problem of key agreement among
a group of parties communicating over an insecure public network. Over the years, a
number of solutions to this problem have been ...
Combined Operation: The Appropriation of Stoney Point Reserve and the Creation of Camp Ipperwash
Combined Operation Stoney Point Reserve Creation of Camp Ipperwash
2009/3/13
The issue of Camp Ipperwash is front page news in the 1990s. The lands in question consist of the former Stoney Point Indian Reserve, approximately 2240 acres, in southwestern Ontario on the shores of...
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
Broadcast encryption Revocation One-way key chain
2009/2/7
We develop a couple of new methods to reduce transmission overheads
in broadcast encryption. The methods are based on the idea of assigning one key
per each partition using one-way key chains after ...
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Combined Differential Linear Related-Key Attacks Block Ciphers MAC Algorithms
2009/1/6
Differential and linear attacks are the most widely used cryptanalytic tools to
evaluate the security of symmetric-key cryptography. Since the introduction of
differential and linear attacks in the ...