搜索结果: 1-6 共查到“军事学 mutual information”相关记录6条 . 查询时间(0.077 秒)
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
masking shuffling RNG
2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
implementation side-channel analysis mutual information analysis
2011/7/25
A theme of recent side-channel research has been the quest for distinguishers which remain effective even when few assumptions can be made about the underlying distribution of the measured leakage tra...
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
implementation / side-channel analysis mutual information
2012/3/27
The resistance of cryptographic implementations to side channel analysis is matter of considerable interest to those concerned with information security. It is particularly desirable to identify the a...
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
implementation / side-channel analysis mutual information analysis differential power analysis Kolmogorov-Smirnov
2012/3/27
A theme of recent side-channel research has been the quest for distinguishers which remain effective even when few assumptions can be made about the underlying distribution of the measured leakage tra...
Revisiting Higher-Order DPA Attacks:Multivariate Mutual Information Analysis
Higher-Order DPA Attacks Multivariate Mutual Information Analysis MMIA
2009/6/15
Security devices are vulnerable to side-channel attacks that
perform statistical analysis on data leaked from cryptographic computa-
tions. Higher-order (HO) attacks are a powerful approach to break...
Mutual Information Analysis A Universal Differential Side-Channel Attack
Differential Side Channel Analysis (DSCA) Information Theory Mutual Information
2008/8/26
In this paper, we develop an information theoretic differential side-channel
attack. An embedded device containing a secret key is modeled as a black box with a
leakage function whose output is capt...