搜索结果: 1-2 共查到“Bug Attacks”相关记录2条 . 查询时间(0.156 秒)
Trapping ECC with Invalid Curve Bug Attacks
Bug Attacks Fault Attacks ECC
font style='font-size:12px;'>
2017/6/9
In this paper we describe how to use a secret bug as a trapdoor to design trapped ellliptic curve E(Fp). This trapdoor can be used to mount an invalid curve attack on E(Fp). E(Fp) is designed to respe...
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
Stealthy Parametric Trojans Bug Attacks
font style='font-size:12px;'>
2016/6/8
Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how h...