搜索结果: 1-15 共查到“军事学 design”相关记录111条 . 查询时间(0.146 秒)
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
hardware security logic obfuscation hardware accelerator
2019/9/19
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the inef...
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
SAT attack Logic locking Secure scan
2019/8/20
Logic locking has emerged as a promising solution against IP piracy and modification by untrusted entities in the integrated circuit design process. However, its security is challenged by boolean sati...
Design of Anonymous Endorsement System in Hyperledger Fabric
Permissioned Blockchain Hyperledger Fabric Anonymous Endorsement System
2019/6/26
Permissioned Blockchain has become quite popular with enterprises forming consortium since it prioritizes trust over privacy. One of the popular platforms for distributed ledger solution, Hyperledger ...
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Filter Permutator FLIP Homomorphic Encryption
2019/5/14
Motivated by the application of delegating computation, we revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorph...
Security is an Architectural Design Constraint
Digital systems design constraints security-efficiency trade-off
2019/3/1
In state-of-the-art design paradigm, time, space and power efficiency are considered the primary design constraints. Quite often, this approach adversely impacts the security of the overall system, es...
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Number Theoretic Transform Large-Degree Polynomial Multiplication Fan-Vercauteren
2019/2/27
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized NTT-based polynomial multiplier architecture, which proves to be effective as an accelerator for lat...
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
zero knowledge implementation zk-SNARKs framework
2019/2/26
We study the problem of building SNARKs modularly by linking small specialized “proof gadgets" SNARKs in a lightweight manner. Our motivation is both theoretical and practical. On the theoretical side...
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
LTE Handover authentication scheme Proxy Signature
2018/11/12
Designing a secure and efficient handover authentication scheme has always been a concern of cellular networks especially in 4G Long Term Evolution (LTE) wireless networks. What makes their handover s...
Despite their usage of pseudonyms rather than persistent identifiers, most existing cryptocurrencies do not provide users with any meaningful levels of privacy. This has prompted the creation of priva...
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
eFPGA ASIC
2018/8/8
This work proposes the first fine-grained configurable cell array specifically tailored for cryptographic implementations. The proposed architecture can be added to future FPGAs as an application-spec...
The ransomware nightmare is taking over the internet impacting common users,small businesses and large ones. The interest and investment which are pushed into this market each month, tells us a few th...
GRANULE: An Ultra lightweight cipher design for embedded security
IoT nodes 8 bit Micro controllers Attacks
2018/6/19
In this paper we proposed an ultra-lightweight cipher GRANULE. It is based on Feistel network which encrypts 64 bits of data with 80/128 bits of key. GRANULE needs very less memory space as compared t...
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
public ledgers formal verification proverif
2018/5/11
Cryptocurrencies have popularized public ledgers, known colloquially as "blockchains". While the Bitcoin blockchain is relatively simple to reason about as, effectively, a hash chain, more complex pub...
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
majority voting modeling attack propagation criterion
2018/4/20
Silicon Physically Unclonable Functions (PUFs) have been proposed as an emerging hardware security primitive in various applications such as device identification, authentication and cryptographic key...