搜索结果: 1-5 共查到“军事学 Rules”相关记录5条 . 查询时间(0.106 秒)
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Lightweight Block Ciphers Side-channels
font style='font-size:12px;'>
2018/11/16
This work focuses on side-channel resilient design strategies for symmetric-key cryptographic primitives targeting lightweight applications. In light of NIST's lightweight cryptography project, design...
Pseudoentropy: Lower-bounds for Chain rules and Transformations
pseudorandomness pseudoentropy lower bounds
font style='font-size:12px;'>
2016/2/23
Computational notions of entropy have recently found many applications, including leakageresilient
cryptography, deterministic encryption or memory delegation. The two main types of
results which ma...
Alternative cubics' rules with an algebraic appeal
public-key cryptography elliptic curve
font style='font-size:12px;'>
2015/12/30
Two alternating vector operations on a cubic hypersurface are given
simple expressions. Direct use of the first operation’s expression seems
less efficient than state-of-the-art elliptic curve crypt...
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
MD hash function padding rule suffix-free
font style='font-size:12px;'>
2009/7/14
This paper characterizes collision preserving padding rules and provides variants
of Merkle-Damgard (MD) which are having less or no overhead costs due to length. We rst
show that sux-free proper...
Improving the Rules of the DPA Contest
Rules DPA Contest Data Encryption Standard
font style='font-size:12px;'>
2009/6/10
A DPA contest has been launched at CHES 2008. The goal
of this initiative is to make it possible for researchers to compare different
side-channel attacks in an objective manner. For this purpose, a...