军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-11 共查到密码学 Power Analysis Attacks相关记录11条 . 查询时间(0.209 秒)
An Inside Job: Remote Power Analysis Attacks on FPGAs     side-channel analysis  FPGA       font style='font-size:12px;'> 2018/1/12
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for s...
Power Analysis Attacks against IEEE 802.15.4 Nodes     AES  side-channel power analysis  DPA       font style='font-size:12px;'> 2015/12/30
IEEE 802.15.4 is a wireless standard used by a variety of higher-level protocols, including many used in the Internet of Things (IoT). A number of system on a chip (SoC) devices that combine a radio t...
Side-channel attacks have been a real threat against many critical embedded systems that rely on cryptographic algorithms as their security engine. A commonly used algorithmic countermeasure, random m...
Power Analysis Attacks against FPGA Implementations of KLEIN     power analysis attack  KLEIN  FPGA       font style='font-size:12px;'> 2013/4/18
KLEIN is a family of block ciphers proposed by Zheng Gong et al. at RFIDSec 2011, and its lightweight features are suitable for resource-constrained devices. However, the original design of KLEIN does...
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems.
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to pro...
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA     Power Analysis  MLPA  multi-linear cryptanalysis       font style='font-size:12px;'> 2009/6/15
Power analysis attacks against embedded secret key cryptosystems are widely studied since the seminal paper of Paul Kocher, Joshua Ja, and Benjamin Jun in 1998 where has been introduced the powerful...
An Improved and Efficient Countermeasure against Power Analysis Attacks     Side channel attack  DPA  RPA  doubling attack       font style='font-size:12px;'> 2009/1/13
Recently new types of differential power analysis attacks (DPA) against elliptic curve cryptosystems (ECC) and RSA systems have been introduced. Most existing countermeasures against classical DPA ...
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks     Sarang Aravamuthan  Viswanatha Rao       font style='font-size:12px;'> 2008/12/18
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further parallelism is achie...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...