搜索结果: 1-2 共查到“密码学 ASICs”相关记录2条 . 查询时间(0.032 秒)
A manufacturer of custom hardware (an ASIC)
can undermine the intended execution of that hardware; highassurance
execution thus requires controlling the manufacturing
chain. However, a trusted plat...
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
authenticated key exchange (AKE) unknown key share (UKS) attacks
2014/3/12
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there...