搜索结果: 1-4 共查到“军事学 threshold implementation”相关记录4条 . 查询时间(0.125 秒)
Threshold Implementation in Software - Case Study of PRESENT
Side-Channel Analysis Boolean masking Threshold Implementation
font style='font-size:12px;'>
2018/3/6
Masking is one of the predominantly deployed countermeasures in order to prevent side-channel analysis (SCA) attacks. Over the years, various masking schemes have been proposed. However, the implement...
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
side-channel analysis masking
font style='font-size:12px;'>
2016/12/12
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. The continuous growth of the leakage power d...
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not
Threshold Implementation Paired t-test Lightweight Cryptography
font style='font-size:12px;'>
2016/5/5
In this work, we explore the possibilities for practical Threshold Implementation (TI) with only two shares in order for a smaller design that needs less randomness but is still first-order leakage re...
Silent Simon: A Threshold Implementation under 100 Slices
provable arguments leakage quantification
font style='font-size:12px;'>
2016/1/3
Lightweight Cryptography aims at achieving security comparable
to conventional cryptography at a much lower cost. Simon is
a lightweight alternative to AES, as it shares same cryptographic parameter...