搜索结果: 1-15 共查到“军事学 Architectures”相关记录19条 . 查询时间(0.25 秒)
Methodology for Efficient CNN Architectures in Profiling Attacks
Side-Channel Attacks Deep Learning Architecture
2019/7/15
The side-channel community has recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems. Previous works have shown the benefit o...
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
SIKE post-quantum cryptography isogeny-based cryptography FPGA
2019/6/19
In this work, we present a fast parallel architecture to perform supersingular isogeny key encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture that uses fast and par...
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Benchmarks data privacy encrypted computation
2017/12/25
Security and privacy are fundamental objectives characterizing contemporary cloud computing. Despite the wide adoption of encryption for protecting data in transit and at rest, data in use remains une...
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
implementation hardware security verification
2017/3/6
Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. ...
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Post-quantum cryptography elliptic curve cryptography isogeny-based cryptography
2016/12/7
In this paper, we present a constant-time hardware implementation that achieves new speed records for the supersingular isogeny Diffie-Hellman (SIDH), even when compared to highly optimized Haswell co...
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems
Hardware Implementation Modular Multiplication Montgomery Algorithm
2016/5/23
The arithmetic in a finite field constitutes the core of Public Key Cryptography like RSA, ECC or pairing-based cryptography. This paper discusses an efficient hardware implementation of the Coarsely ...
Solving Quadratic Equations with XL on Parallel Architectures - extended version
block Wiedemann sparse solver multivariate quadratic systems
2016/5/3
Solving a system of multivariate quadratic equations (MQ) is an NP-complete problem whose complexity estimates are relevant to many cryptographic scenarios. In some cases it is required in the best kn...
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
number theoretic transform Ring learning with errors
2016/3/24
Many lattice based cryptosystems are based on the Ring learning with errors (Ring-LWE) problem. The most critical and computationally intensive operation of these Ring-LWE based cryptosystems is polyn...
Isolated Execution on Many-core Architectures
many-core systems hardware security architecture
2016/1/25
We explore how many-core platforms can be used to enhance the security of future systems and to support important security
properties such as runtime isolation using a small Trusted Computing Base (T...
Universally Composable Firewall Architectures using Trusted Hardware
Formal Models Firewalls Universal Composability
2016/1/4
Network firewalls are a standard security measure in computer networks that
connect to the Internet. Often, ready-to-use firewall appliances are trusted to protect the
network from malicious Interne...
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Fault attacks instructions cache embedded systems
2016/1/4
Hardware and software of secured embedded systems are prone to physical attacks. In particular,
fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker ...
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Montgomery algorithm Digit-based Multiplier FPGA
2015/12/25
This report describes the design and implementation results in FPGAs of a scalable hardware architecture for computing modular multiplication in prime fields GF(p), based on the Montgomery multiplicat...
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
hardware implementation energy
2014/3/6
In this paper we perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. We do this...
Lightweight block ciphers are designed so as to fit into very constrained environments, but usually not really with software performance in mind. For classical lightweight applications where many cons...
Fast Architectures for the T Pairing over Small-Characteristic Supersingular Elliptic Curves
Tate pairing T pairing elliptic curve FPGA
2009/8/18
This paper is devoted to the design of fast parallel
accelerators for the cryptographic T pairing on supersingular
elliptic curves over finite fields of characteristics two and three.
We propose h...