搜索结果: 1-15 共查到“知识库 军事学 Systematic”相关记录16条 . 查询时间(0.046 秒)
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Belief Propagation Factor Graphs AES
2018/7/16
We define a novel metric to capture the importance of variable nodes in factor graphs, we propose two improvements to the sum-product algorithm for the specific use case in side channel analysis, and ...
This paper is devoted to the study of transaction fees in massively replicated open blockchain systems. In such systems, like Bitcoin, a snapshot of current state required for the validation of transa...
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
side-channel elliptic curves scalar multiplications
2017/6/28
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes their security evaluations complex, in particular in case of time constraints making exhaustive analy...
In December 2015, Juniper Networks announced that unknown attackers had added unauthorized code to ScreenOS, the operating system for their NetScreen VPN routers. This code created two vulnerabilities...
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
cryptanalysis public-key cryptography McEliece cryptosystem
2016/1/7
We show that the plaintext of some of the proposed CCA2 conversions of McEliece cryptosystem
with a public key in systematic form can be recovered faster than with a general linear
decoding. This is...
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Orbit rotation symmetric function Walsh transform
2015/12/30
In the literature, few constructions of n-variable rotation symmetric bent functions have been presented,
which either have restriction on n or have algebraic degree no more than 4. In this paper, fo...
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Cache slices Intel last level cache,
2015/12/29
Dividing last level caches into slices is a popular method to prevent memory accesses from
becoming a bottleneck on modern multicore processors. In order to assess and understand the benefits
of cac...
Secret Key Cryptosystem based on Non-Systematic Polar Codes
Code based cryptography Polar codes Secret key cryptosystem
2014/3/6
Polar codes are a new class of error correcting linear block codes, whose generator matrix is specified by the knowledge of transmission channel parameters, code length and code dimension. Moreover, r...
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Cryptography Hardware Accelerator
2014/3/13
With increasing usage of hardware accelerators in modern heterogeneous System-on-Chips (SoCs), the distinction between hardware and software is no longer rigid. The domain of cryptography is no except...
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
side-channel cryptanalysis
2013/4/18
Generic side-channel distinguishers aim at revealing the correct key embedded in cryptographic modules even when few assumptions can be made about their physical leakages. In this context, Kolmogorov-...
TLS is the most widely-used cryptographic protocol on the Internet. It comprises the TLS Handshake Protocol, responsible for authentication and key establishment, and the TLS Record Protocol, which ta...
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Physical Unclonable Function Challenge Response
2012/6/14
In this work, we propose a systematic method to evaluate and compare the performance of Physical Unclonable Functions (PUFs). The need for such a method is justified by the fact that various types of ...
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Physical Unclonable Function Challenge Response Ring Oscillator Arbiter Parameter Performance
2012/3/20
In this work, we propose a systematic method to evaluate and compare the performance of Physical Unclonable Functions (PUFs). The need for such a method is justified by the fact that various types of ...
Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes
Forgotten Secret Recovering Scheme Fuzzy Vault Scheme Reed-Solomon code
2009/8/7
In this paper, we revisit the Forgotten Secret Recovering
Scheme for k users, referred to as FSRS(k) previously proposed
by the present author. FSRS(k) takes advantage of the
fact that Reed-Solomon...
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Authentication Password Smart Card Guessing Attack
2008/12/12
One of the most commonly used two-factor authentication
mechanisms is based on smart card and user's password. Throughout the
years, there have been many schemes proposed, but most of them have
alr...