搜索结果: 1-15 共查到“军事学 A Study”相关记录49条 . 查询时间(0.304 秒)
A Study of Persistent Fault Analysis
Fault Analysis PFA Feistel Networks Reverse Engineering
2019/9/19
Persistent faults mark a new class of injections that perturb lookup tables within block ciphers with the overall goal of recovering the encryption key. Unlike earlier fault types persistent faults re...
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
TPMS 8-bit micro-controllers FELICS
2019/7/22
The Tire Pressure Monitoring System (TPMS) is used to monitor the pressure of the tires and to inform the driver of it. This equipment is mandatory for vehicles in US and EU. To ensure the security of...
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Side Channel Analysis Profiling Attacks Machine Learning
2019/5/5
In Side Channel Analysis, masking is known to be a reliable and robust counter-measure. Recently, several papers have focused on the application of the Deep Learning (DL) theory to improve the efficie...
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon
Post-quantum signature Falcon constant-time
2019/3/6
Sampling from discrete Gaussian distribution has applications in lattice-based post-quantum cryptography. Several efficient solutions have been proposed in recent years. However, making a Gaussian sam...
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Post-Quantum Cryptography Hardware Implementation
2019/1/26
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer a...
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Side channel deep dearning template attack
2018/12/24
This study compares the experimental results of Template Attacks (TA) and Deep Learning (DL) techniques called Multi Layer Perceptron (MLP) and Convolutional Neural Network (CNN), concurrently in fron...
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
compressive sensing matching pursuit OMP
2018/12/3
An important prerequisite for Side-channel Attack (SCA) is leakage sampling where the side-channel measurements (e.g. power traces) of the cryptographic device are collected for further analysis. Howe...
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
MBFFA AES Implementation
2018/11/12
Parallel cryptographic implementations are generally considered to be more advantageous than their non-parallel counterparts in mitigating side-channel attacks because of their higher noise-level. So ...
ElGamal cryptosystem is typically developed in the multiplicative group Z∗pZp∗ (pp is a prime number), but it can be applied to the other groups in which discrete logarithm problem should ...
User Study on Single Password Authentication
Password authentication usability two-factor authentication
2018/11/6
Single password authentication (SPA) schemes are introduced to overcome the challenges of traditional password authentications, which are vulnerable to offline dictionary, phishing, honeypot, and man-...
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
TLS FPGA
2018/8/2
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few proof-of-conce...
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Belief Propagation Factor Graphs AES
2018/7/16
We define a novel metric to capture the importance of variable nodes in factor graphs, we propose two improvements to the sum-product algorithm for the specific use case in side channel analysis, and ...
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
applied cryptography public-key cryptography side-channel analysis
2018/7/9
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption. Ahead of schedule, code for this functionality was recently mainlined...
Collateral Damage of Facebook Applications: a Comprehensive Study
Collateral Damage Facebook Applications
2018/3/26
Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the app...
Threshold Implementation in Software - Case Study of PRESENT
Side-Channel Analysis Boolean masking Threshold Implementation
2018/3/6
Masking is one of the predominantly deployed countermeasures in order to prevent side-channel analysis (SCA) attacks. Over the years, various masking schemes have been proposed. However, the implement...