搜索结果: 1-3 共查到“re-use”相关记录3条 . 查询时间(0.156 秒)
Possibilities and Impossibilities for PUF Protocols under PUF Re-Use and PUFs-inside-PUFs Attacks
Physical Unclonable Functions Cryptographic Protocols
font style='font-size:12px;'>
2016/3/23
We continue investigations on the use of so-called Strong PUFs as a cryptographic primitive in realistic attack models. We focus on two scenarios: Firstly, the {\it PUF re-use model}, where PUFs are b...
Greyfield Adaptive Re-use: Applying a matrix of contemporary theory to a real site in Springfield, MA
Greyfield Adaptive Re-use Springfield
font style='font-size:12px;'>
2014/12/8
New neighborhood and home construction since World War II has been rapid and sprawling. Development companies have used increasingly efficient modular plans and construction techniques to design, grad...
Avoid Mask Re-use in Masked Galois Multipliers
AES S-box masking DPA
font style='font-size:12px;'>
2009/6/11
This work examines a weakness in re-using masks for masked Galois inversion, specifically in the
masked Galois multipliers. Here we show that the mask re-use scheme included in our work[1] cannot
re...