搜索结果: 1-7 共查到“军队指挥学 ASIC”相关记录7条 . 查询时间(0.109 秒)
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Authenticated encryption hardware performance authenticated encryption mode
2019/6/24
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel wit...
In this paper, we study the problem of implementing the AEAD scheme, AEGIS-128, which is a finalist in the recently concluded competition, CAESAR. In order to achieve lightweight (least area) implemen...
Cryptographic hash functions have wide applications including password hashing, pricing functions for spam and denial-of-service countermeasures and proof of work in cryptocurrencies. Recent progress ...
On Measurable Side-Channel Leaks inside ASIC Design Primitives
implementation Side-channel attacks
2014/3/10
Leaks inside semi-custom ASIC (Application Specific Integrated Circuit) design primitives are rigorously investigated. The study is conducted by measuring a dedicated TEG (Test Element Group) chip wit...
Collision Timing Attack when Breaking 42 AES ASIC Cores
implementation / Timing Attack Collision Attack Fault Sensitivity AES ASIC
2012/3/29
A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated. The attack is based on the correlation collision attack presented at CHES ...
FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
Tate pairing elliptic curve cryptography finite field arithmetic
2009/6/5
Since their introduction in constructive cryptographic
applications, pairings over (hyper)elliptic curves are at
the heart of an ever increasing number of protocols. As they rely
critically on effi...