搜索结果: 1-15 共查到“军事学 combined”相关记录15条 . 查询时间(0.187 秒)
The Art of Guessing in Combined Side-Channel Collision Attacks
MDCCF distinguisher voting collision voting
font style='font-size:12px;'>
2019/6/13
Recent combined collision attacks have shown promising results for exploiting side-channel leakage information from both divide-and-conquer and analytical distinguishers. However, divide-and-conquer d...
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Combined Security DPA DFA
font style='font-size:12px;'>
2019/6/4
In order to thwart Differential Power Analysis (DPA) and Differential Fault Analysis (DFA) attacks, we require the implemented algorithm to ensure correct output and sensitive variable privacy. We pro...
ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
side-channel analysis fault injection countermeasure
font style='font-size:12px;'>
2016/6/27
Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation. Hardening cryptographic implementations with appropriate countermeasures is thus essen...
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
font style='font-size:12px;'>
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Grain stream cipher Differential Power Analysis Fault Attack Countermeasures
font style='font-size:12px;'>
2015/12/29
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against the Grain family of stream ciphers (Grain v1 and Grain-128) by resynchronizing the cipher multiple ...
Combined Modeling and Side Channel Attacks on Strong PUFs
Strong PUFs Modeling Attacks
font style='font-size:12px;'>
2014/3/7
Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core pr...
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
side-channel attacks combined collision attacks linear collision attacks DPA AES
font style='font-size:12px;'>
2010/11/22
The fundamental problem of extracting the highest possible amount of key-related information using the lowest possible number of measurements is central to side-channel attacks against embedded implem...
Tardos Fingerprinting Codes in the Combined Digit Model
Tardos Fingerprinting Codes Combined Digit Model colluders
font style='font-size:12px;'>
2009/6/15
We introduce a new attack model for collusion secure codes, and analyze the collusion resistance of two
version of the Tardos code in this model, both for binary and non-binary alphabets. The model a...
Combined(identity-based)public key schemes
Combined public key scheme identity-based cryptography key separation
font style='font-size:12px;'>
2009/6/9
Consider a scenario in which parties use a public key encryption
scheme and a signature scheme with a single public key/private key
pair—so the private key sk is used for both signing and decrypting...
Safe Prime Generation with a Combined Sieve
Safe primes Prime generation
font style='font-size:12px;'>
2009/4/10
A number p is a safe prime if both p and (p − 1)/2 are
prime. This note describes a method of generating safe primes that is
considerably faster than repeatedly generating random primes q unti...
Secure Group Communications over Combined Wired/Wireless Networks
Group key agreement combined wired/wireless networks mobile devices DDH assumption
font style='font-size:12px;'>
2009/3/31
This paper considers the fundamental problem of key agreement among
a group of parties communicating over an insecure public network. Over the years, a
number of solutions to this problem have been ...
Combined Operation: The Appropriation of Stoney Point Reserve and the Creation of Camp Ipperwash
Combined Operation Stoney Point Reserve Creation of Camp Ipperwash
font style='font-size:12px;'>
2009/3/13
The issue of Camp Ipperwash is front page news in the 1990s. The lands in question consist of the former Stoney Point Indian Reserve, approximately 2240 acres, in southwestern Ontario on the shores of...
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
Broadcast encryption Revocation One-way key chain
font style='font-size:12px;'>
2009/2/7
We develop a couple of new methods to reduce transmission overheads
in broadcast encryption. The methods are based on the idea of assigning one key
per each partition using one-way key chains after ...
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Combined Differential Linear Related-Key Attacks Block Ciphers MAC Algorithms
font style='font-size:12px;'>
2009/1/6
Differential and linear attacks are the most widely used cryptanalytic tools to
evaluate the security of symmetric-key cryptography. Since the introduction of
differential and linear attacks in the ...
基于Multi-stream Combined隐马尔柯夫模型源端检测DDoS攻击
分布式拒绝服务攻击 隐马尔柯夫模型 源端检测
font style='font-size:12px;'>
2008/5/19
提出了一种新颖的综合考虑多维观测特征的DDoS攻击源端检测方法。该方法引入S-D-P特征概念,并抽取TCP/IP包头中的标志位和ID字段构成多维观测特征,采用Multi-stream Combined隐马尔可夫模型(MC-HMM)在源端网络检测DDoS攻击。大量实验表明,MC-HMM方法克服了基于一维观测特征的检测算法信息量过小的固有缺陷,能够有效降低检测的误报率和漏报率,提高DDoS攻击源端检测...