搜索结果: 1-15 共查到“军事学 first”相关记录38条 . 查询时间(0.192 秒)
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Lightweight cryptography FPGA Authenticated cipher
font style='font-size:12px;'>
2019/7/17
Security in the Internet of Things (IoT) is challenging. The need for lightweight yet robust cryptographic solutions suitable for the IoT calls for improved design and implementation of constructs suc...
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
RFID scheme PUF authentication
font style='font-size:12px;'>
2019/2/27
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. No RFID scheme is known so far to meet t...
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
compressive sensing matching pursuit OMP
font style='font-size:12px;'>
2018/12/3
An important prerequisite for Side-channel Attack (SCA) is leakage sampling where the side-channel measurements (e.g. power traces) of the cryptographic device are collected for further analysis. Howe...
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
font style='font-size:12px;'>
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
side-channel analysis Threshold Implementation AES
font style='font-size:12px;'>
2018/11/12
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
font style='font-size:12px;'>
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs
Fully Homomorphic Encryption Deep Learning Encrypted CNN
font style='font-size:12px;'>
2018/11/2
Fully homomorphic encryption, with its widely-known feature of computing on encrypted data, empowers a wide range of privacy-concerned cloud applications including deep learning as a service. This com...
A First-Order SCA Resistant AES without Fresh Randomness
side-channel analysis threshold implementation randomness
font style='font-size:12px;'>
2018/3/6
Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting embedded devices against Side-Channel Analysis (SCA) attacks has been a major research effort. Even though many diffe...
A first-order chosen-plaintext DPA attack on the third round of DES
side-channel attack DPA countermeasure
font style='font-size:12px;'>
2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
Manifold Learning Towards Masking Implementations: A First Study
machine learning manifold learning dimensionality reduction
font style='font-size:12px;'>
2017/11/21
Linear dimensionality reduction plays a very important role in side channel attacks, but it is helpless when meeting the non-linear leakage of masking implementations. Increasing the order of masking ...
The First Thorough Side-Channel Hardware Trojan
side-channel analysis threshold implementation hardware Trojan
font style='font-size:12px;'>
2017/9/14
Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible wh...
On the Easiness of Turning Higher-Order Leakages into First-Order
side-channel analysis masking higher-order
font style='font-size:12px;'>
2017/3/31
Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking...
The first collision for full SHA-1
hash function cryptanalysis collision attack
font style='font-size:12px;'>
2017/3/6
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoret...
A First DFA on PRIDE: from Theory to Practice (extended version)
implementation cryptanalysis
font style='font-size:12px;'>
2017/2/20
PRIDE is one of the most effcient lightweight block cipher proposed so far for connected objects with high performance and low resource constraints. In this paper we describe the first ever complete D...
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
verifiable computation data hashes commit and prove
font style='font-size:12px;'>
2016/12/8
Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy. Recent schemes enable a verifier with limited resources to delegate large computations and ...