搜索结果: 1-9 共查到“军队指挥学 Vulnerability”相关记录9条 . 查询时间(0.069 秒)
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
Vulnerability and Remedy of Stripped Function Logic Locking
Logic Locking SAT-based Attack Stripped Function Logic Locking
2019/2/26
Stripped Function Logic Locking (SFLL) as the most advanced logic locking technique is robust against both the SAT-based and the removal attacks under the assumption of thorough resynthesis of the str...
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Side-Channel Vulnerability FPGA-Based Crypto-systems
2016/2/24
Besides security against classical cryptanalysis, its important
for cryptographic implementations to have sufficient robustness against
side-channel attacks. Many countermeasures have been proposed ...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
secret-key cryptography AES
2016/1/7
This paper investigates pairs of AES-128 cipher keys and plaintexts which result in
being “quiet” in the final round, i.e., whose 128-bit State holds the same bit pattern
before and after Round 10. ...
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Vulnerability FPGA Xilinx Virtex-II FPGAs
2011/7/25
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems.
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
implementation / Side-Channel Analysis
2012/3/27
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to pro...
Vulnerability of SSL to Chosen-Plaintext Attack
Chosen Plaintext Attack SSL/TLS Cryptanalysis
2009/3/26
The Secure Sockets Layer (SSL) protocol is widely used for securing communication over
the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use
of the cipher bloc...
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
Timing Analysis Side Channel Analysis Stochastic Process
2008/5/29
Recently, Acıi¸cmez, Ko¸c, and Seifert have introduced new side-channel analysis types,namely Branch Prediction Analysis (BPA) and Simple Branch Prediction Analysis (SBPA), which take...