搜索结果: 1-15 共查到“军事学 architectures”相关记录19条 . 查询时间(0.046 秒)
Methodology for Efficient CNN Architectures in Profiling Attacks
Side-Channel Attacks Deep Learning Architecture
font style='font-size:12px;'>
2019/7/15
The side-channel community has recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems. Previous works have shown the benefit o...
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
SIKE post-quantum cryptography isogeny-based cryptography FPGA
font style='font-size:12px;'>
2019/6/19
In this work, we present a fast parallel architecture to perform supersingular isogeny key encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture that uses fast and par...
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Benchmarks data privacy encrypted computation
font style='font-size:12px;'>
2017/12/25
Security and privacy are fundamental objectives characterizing contemporary cloud computing. Despite the wide adoption of encryption for protecting data in transit and at rest, data in use remains une...
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
implementation hardware security verification
font style='font-size:12px;'>
2017/3/6
Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. ...
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Post-quantum cryptography elliptic curve cryptography isogeny-based cryptography
font style='font-size:12px;'>
2016/12/7
In this paper, we present a constant-time hardware implementation that achieves new speed records for the supersingular isogeny Diffie-Hellman (SIDH), even when compared to highly optimized Haswell co...
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems
Hardware Implementation Modular Multiplication Montgomery Algorithm
font style='font-size:12px;'>
2016/5/23
The arithmetic in a finite field constitutes the core of Public Key Cryptography like RSA, ECC or pairing-based cryptography. This paper discusses an efficient hardware implementation of the Coarsely ...
Solving Quadratic Equations with XL on Parallel Architectures - extended version
block Wiedemann sparse solver multivariate quadratic systems
font style='font-size:12px;'>
2016/5/3
Solving a system of multivariate quadratic equations (MQ) is an NP-complete problem whose complexity estimates are relevant to many cryptographic scenarios. In some cases it is required in the best kn...
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
number theoretic transform Ring learning with errors
font style='font-size:12px;'>
2016/3/24
Many lattice based cryptosystems are based on the Ring learning with errors (Ring-LWE) problem. The most critical and computationally intensive operation of these Ring-LWE based cryptosystems is polyn...
Isolated Execution on Many-core Architectures
many-core systems hardware security architecture
font style='font-size:12px;'>
2016/1/25
We explore how many-core platforms can be used to enhance the security of future systems and to support important security
properties such as runtime isolation using a small Trusted Computing Base (T...
Universally Composable Firewall Architectures using Trusted Hardware
Formal Models Firewalls Universal Composability
font style='font-size:12px;'>
2016/1/4
Network firewalls are a standard security measure in computer networks that
connect to the Internet. Often, ready-to-use firewall appliances are trusted to protect the
network from malicious Interne...
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Fault attacks instructions cache embedded systems
font style='font-size:12px;'>
2016/1/4
Hardware and software of secured embedded systems are prone to physical attacks. In particular,
fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker ...
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Montgomery algorithm Digit-based Multiplier FPGA
font style='font-size:12px;'>
2015/12/25
This report describes the design and implementation results in FPGAs of a scalable hardware architecture for computing modular multiplication in prime fields GF(p), based on the Montgomery multiplicat...
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
hardware implementation energy
font style='font-size:12px;'>
2014/3/6
In this paper we perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. We do this...
Implementing Lightweight Block Ciphers on x86 Architectures
PICCOLO PRESENT
font style='font-size:12px;'>
2014/3/11
Lightweight block ciphers are designed so as to fit into very constrained environments, but usually not really with software performance in mind. For classical lightweight applications where many cons...
Fast Architectures for the T Pairing over Small-Characteristic Supersingular Elliptic Curves
Tate pairing T pairing elliptic curve FPGA
font style='font-size:12px;'>
2009/8/18
This paper is devoted to the design of fast parallel
accelerators for the cryptographic T pairing on supersingular
elliptic curves over finite fields of characteristics two and three.
We propose h...