搜索结果: 1-11 共查到“军事学 Power Analysis Attacks”相关记录11条 . 查询时间(0.174 秒)
An Inside Job: Remote Power Analysis Attacks on FPGAs
side-channel analysis FPGA
font style='font-size:12px;'>
2018/1/12
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
font style='font-size:12px;'>
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
power analysis attack LEA ARX
font style='font-size:12px;'>
2016/1/5
The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for s...
Power Analysis Attacks against IEEE 802.15.4 Nodes
AES side-channel power analysis DPA
font style='font-size:12px;'>
2015/12/30
IEEE 802.15.4 is a wireless standard used by a variety of higher-level protocols, including many used in the Internet of Things (IoT). A number of system on a chip (SoC) devices that combine a radio t...
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Side-channel attacks shuffling Keccak
font style='font-size:12px;'>
2015/12/24
Side-channel attacks have been a real threat against many critical embedded systems that rely on cryptographic algorithms as their security engine. A commonly used algorithmic countermeasure, random m...
Power Analysis Attacks against FPGA Implementations of KLEIN
power analysis attack KLEIN FPGA
font style='font-size:12px;'>
2013/4/18
KLEIN is a family of block ciphers proposed by Zheng Gong et al. at RFIDSec 2011, and its lightweight features are suitable for resource-constrained devices. However, the original design of KLEIN does...
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Vulnerability FPGA Xilinx Virtex-II FPGAs
font style='font-size:12px;'>
2011/7/25
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems.
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
implementation / Side-Channel Analysis
font style='font-size:12px;'>
2012/3/27
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to pro...
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
Power Analysis MLPA multi-linear cryptanalysis
font style='font-size:12px;'>
2009/6/15
Power analysis attacks against embedded secret key cryptosystems are widely
studied since the seminal paper of Paul Kocher, Joshua Ja, and Benjamin Jun in
1998 where has been introduced the powerful...
An Improved and Efficient Countermeasure against Power Analysis Attacks
Side channel attack DPA RPA doubling attack
font style='font-size:12px;'>
2009/1/13
Recently new types of differential power analysis attacks
(DPA) against elliptic curve cryptosystems (ECC) and RSA systems
have been introduced. Most existing countermeasures against classical
DPA ...
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Sarang Aravamuthan Viswanatha Rao
font style='font-size:12px;'>
2008/12/18
The Elliptic Curve Digital Signature Algorithm admits a
natural parallelization wherein the point multiplication step can be split
in two parts and executed in parallel. Further parallelism is achie...