搜索结果: 1-7 共查到“军队指挥学 synthesis”相关记录7条 . 查询时间(0.125 秒)
Synthesis of Adaptive Side-Channel Attacks
Side-Channel Attacks Quantitative Information Flow Cryptography
2017/5/11
We present symbolic analysis techniques for detecting vulnerabilities that are due to adaptive side-channel attacks, and synthesizing inputs that exploit the identified vulnerabilities. We start with ...
This article proposes a method for the construction of a public key system that is based on
VLSI logic synthesis algorithms. First, we discuss the properties of VLSI logic synthesis algorithms.
Then...
Fault attacks are active attacks in which an adversary with physical access to a
cryptographic device, for instance a smartcard, tampers with the execution of an algorithm to
retrieve secret materia...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
modes of operation synthesis
2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks.
Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Structure-Preserving Signatures Generic Group Model Bilinear Groups
2016/1/5
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the
number of group elements needed in the verification key and the signature, and the number of pairing...
Automated Analysis and Synthesis of Authenticated Encryption Schemes
secret-key cryptography authenticated encryption synthesis
2015/12/29
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions
of confidentiality and integrity. Although various AE schemes are known, there remains significant
...
This paper describes the synthesis of Dynamic Differential Logic to increase the resistance
of FPGA implementations against Differential Power Analysis. The synthesis procedure is
developed and a de...