搜索结果: 1-15 共查到“军事学 Survey”相关记录32条 . 查询时间(0.203 秒)
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Authenticated encryption hardware performance authenticated encryption mode
font style='font-size:12px;'>
2019/6/24
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel wit...
A Survey of Leakage-Resilient Cryptography
Leakage-resilience side channel attacks
font style='font-size:12px;'>
2019/3/21
In the past 15 years, cryptography has made considerable progress in expanding the adversarial attack model to cover side-channel attacks, and has built schemes to provably defend against some of them...
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Internet of Things Elliptic curve cryptosystems Side-channel attack
font style='font-size:12px;'>
2019/1/9
The main objective of the Internet of Things is to interconnect everything around us to obtain information which was unavailable to us before, thus enabling us to make better decisions. This interconn...
A Survey of Two Verifiable Delay Functions
VDF both schemes
font style='font-size:12px;'>
2018/8/2
A verifiable delay function (VDF) is an important tool used for adding delay in decentralized applications. This short note briefly surveys and compares two recent beautiful Verifiable Delay Functions...
Static Power Side-Channel Analysis - A Survey on Measurement Factors
CMOS Measurement Factors
font style='font-size:12px;'>
2018/7/16
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...
A Survey and Refinement of Repairable Threshold Schemes
threshold schemes repairability combinatorial designs
font style='font-size:12px;'>
2017/11/29
We consider repairable threshold schemes (RTSs), which are threshold schemes that enable a player to securely reconstruct a lost share with help from their peers. We summarise and, where possible, ref...
Survey of Approaches for Security Verification of Hardware/Software Systems
formal methods theorem provers model checkers
font style='font-size:12px;'>
2016/12/10
Variety of computing systems have been proposed to provide protection for sensitive code or data through hardware or software mechanisms. This paper surveys the landscape of security verification appr...
A survey on physiological-signal-based security for medical devices
IMDs PS
font style='font-size:12px;'>
2016/12/9
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring a...
A survey of attacks on Ethereum smart contracts
smart contracts blockchain cryptocurrencies
font style='font-size:12px;'>
2016/12/8
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and tra...
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
font style='font-size:12px;'>
2016/7/22
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size ...
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Microarchitectural timing attacks Cache-based timing attacks Countermeasures
font style='font-size:12px;'>
2016/6/17
Microarchitectural timing channels expose hidden hardware state though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for...
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
Processor Architectures Side-channels Covert-channels
font style='font-size:12px;'>
2016/5/24
Over last two decades, side and covert channel research has shown variety of ways of exfiltrating information for a computer system. Processor microarchitectural side and covert channel attacks have e...
Hopes, Fears and Software Obfuscation: A Survey
Obfuscation survey
font style='font-size:12px;'>
2016/3/1
I survey some of the recent progress on software obfuscation spurred by the exciting paper of Garg, Gentry, Halevi, Raykova, Sahai and Waters (FOCS 2013). This is a preprint version of a review articl...
Attacks in Stream Ciphers: A Survey
Survey Cryptoanalisys
font style='font-size:12px;'>
2016/1/7
Nowadays there are different types of attacks in block and stream ciphers. In
this work we will present some of the most used attacks on stream ciphers. We
will present the newest techniques with an...
A survey of Fault Attacks in Pairing Based Cryptography
Pairing based cryptography Miller’s algorithm fault attacks
font style='font-size:12px;'>
2016/1/7
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography.
These make the use of pairings suitable for small and constrained devices (smart phones, smart
cards. ....