搜索结果: 1-15 共查到“军事学 energy”相关记录19条 . 查询时间(0.302 秒)
The specification of Bluetooth and Bluetooth Low Energy includes dedicated encryption key negotiation protocols used by two parties to agree on the entropy of encryption keys. In this work, we show th...
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
ARM compute cluster cyptanalysis
2018/11/9
Servers with many cores cost a lot of money and consume large amounts of energy. The developments in hardware for mobile devices has resulted in a surge in relatively cheap, powerful, and low-energy C...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
Compact Energy and Delay-aware Authentication
Applied cryptography delay-aware authentication real-time networks
2018/1/11
Authentication and integrity are fundamental security services that are critical for any viable system. However, some of the emerging systems (e.g., smart grids, aerial drones) are delay-sensitive, an...
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities
data privacy homomorphic encryption secure classification
2017/12/19
Smart Cities draw a nice picture of a connected city where useful services and data are ubiquitous, energy is properly used and urban infrastructures are well orchestrated. Fulfilling this vision in o...
Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones
implementation public-key cryptography lightweight cryptography
2017/10/30
Aerial drones are becoming an integral part of application domains such as package delivery, construction, monitoring and search/rescue operations. It is critical to ensure the cyber-security of netwo...
Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing
glitch power glitch filter unrolled block ciphers
2016/12/7
Energy consumption of block ciphers is critical in resource constrained devices. Unrolling has been explored in literature as a technique to increase efficiency by eliminating energy spent in loop con...
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Kalray MPPA-256 manycore processor Multiprecision modular arithmetic Integer factorization
2016/4/13
The Kalray MPPA-256 processor is based on a recent low-energy manycore architecture. In this article, we investigate its performance in multiprecision arithmetic for number-theoretic applications. We ...
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
AES SPECK lightweight
2016/1/5
Embedded microcontroller applications often experience multiple limiting constraints: memory, speed, and for a wide range of portable devices, power. Applications requiring encrypted data must simulta...
Buying AES Design Resistance with Speed and Energy
side channel attacks fault attacks AES
2015/12/24
Fault and power attacks are two common ways of extracting secrets from tamper-resistant chips. Although several protections have been proposed to thwart these attacks, resistant designs usually claim ...
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
energy lightweight masking
2015/12/23
This paper uses an Instruction Set Architecture (ISA) based
statistical energy model of an ARM Cortex-M4 microprocessor to evaluate
the energy consumption of an implementation of AES with different
...
Exploring Energy Efficiency of Lightweight Block Ciphers
AES Lightweight Block Cipher Low Power/Energy Circuits.
2015/12/23
In the last few years, the field of lightweight cryptography
has seen an influx in the number of block ciphers and hash functions
being proposed. One of the metrics that define a good lightweight de...
The Energy Budget for Wireless Security: Extended Version
Wireless Security RFID Authentication
2015/12/22
Due to the numerous security and privacy risks, applications deployed in wireless
networks require strong cryptographic protection. Reducing the energy cost of cryptographic
algorithms and protocols...
Midori: A Block Cipher for Low Energy (Extended Version)
AES lightweight block cipher low energy circuits
2015/12/21
In the past few years, lightweight cryptography has become
a popular research discipline with a number of ciphers and hash functions
proposed. The designers’ focus has been predominantly to minimize...
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
hardware implementation energy
2014/3/6
In this paper we perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. We do this...