搜索结果: 1-15 共查到“军队指挥学 Hardware implementation”相关记录15条 . 查询时间(0.107 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
NTRU lattice-based hardware
2019/4/1
In this paper, we present a high-speed constant time hardware implementation of NTRUEncrypt Short Vector Encryption Scheme (SVES), fully compliant with the IEEE 1363.1 Standard Specification for Publi...
On Hardware Implementation of Tang-Maitra Boolean Functions
Boolean Functions Bent Functions Cryptology
2018/7/16
In this paper, we investigate the hardware circuit complexity of the class of Boolean functions recently introduced by Tang and Maitra (IEEE-TIT 64(1): 393 402, 2018). While this class of functions ha...
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
White-Box Side-Channel CPA
2016/2/26
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its funda...
Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Elliptic Curves Cryptosystems(ECC) RSA ASIC
2016/1/27
The strength of ECC lies in the hardness of elliptic curve
discrete logarithm problem (ECDLP) and the hight level security with
significantly smaller keys. Thus, using smaller key sizes is a gain in...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
implementation Secret sharing
2016/1/6
Shamir’s secret sharing scheme is an effective way to distribute secret to a group of
shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect
the system from ch...
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves
BN curves Optimal Ate Pairing Final Exponentiation
2015/12/21
To have an efficient asymmetric key encryption scheme, such as elliptic
curves, hyperelliptic curves, pairing ... etc we have to go through
arithmetic optimization then hardware optimization. Regard...
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
PMI+ Encryption and Decryption Hardware Implementation
2014/3/5
PMI+ is a Multivariate Quadratic (MQ) public key algorithm used for encryption and decryption operations, and belongs to post quantum cryptography.We designs a hardware on FPGAs to efficiently impleme...
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Garbled Circuit Hardware Implementation Leakage-Resilience One-Time Programs Secure Function Evaluation
2010/7/13
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain classes of side-channel ...
Skein is a submission to the NIST SHA-3 hash function com-
petition which has been optimized towards implementation in modern
64-bit processor architectures. This paper investigates the performance
...
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Hardware Implementation MICKEY-128 Stream Cipher
2009/3/3
Encryption algorithms are becoming more necessary to
ensure the securely transmitted data over insecure
communication channels. MICKEY-128 is a recently
developed stream cipher with two major advan...
Hardware Implementation of the T Pairing in Characteristic 3
characteristic 3 elliptic curve reconfigurable processor
2008/12/25
Recently, there have been many proposals for secure and novel cryptographic
protocols that are built on bilinear pairings. The T pairing is one such
pairing and is closely related to the Tate pair...
An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
Tate pairing characteristic three elliptic curve
2008/12/19
n this paper, we propose a modified T pairing
algorithm in characteristic three which does not need any cube
root extraction. We also discuss its implementation on a low cost
platform which hosts a...
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
Sublinear Point Multiplication Koblitz Curves Hardware Implementation
2008/12/17
We describe algorithms for point multiplication on Koblitz
curves using multiple-base expansions of the form k = P a( 1)b
and k = P a( 1)b( 2 1)c: ...