找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptographic Hardware and Embedded Systems -- CHES 2015; 17th International W Tim Güneysu,Helena Handschuh Conference proceedings 2015 Int

[復(fù)制鏈接]
樓主: 棕櫚等
41#
發(fā)表于 2025-3-28 15:34:24 | 只看該作者
Ondine Bradbury,Daniela AcquaroMersenne-like primes, the proposed RNS algorithm requires 2 times less moduli than the state-of-art ones, leading to 4 times less precomputations and about 2 times less operations. FPGA implementations of our algorithm are presented, with area reduced up to 46?%, for a time overhead less than 10?%.
42#
發(fā)表于 2025-3-28 20:31:34 | 只看該作者
43#
發(fā)表于 2025-3-29 01:30:04 | 只看該作者
The Application of the WBE Theory,omewhat homomorphic encryption scheme YASHE. Our implementation is the first FPGA implementation that is designed for evaluating functions on homomorphically encrypted data (up?to a certain multiplicative depth) and we illustrate this capability by evaluating the SIMON-64/128 block cipher in the enc
44#
發(fā)表于 2025-3-29 06:43:33 | 只看該作者
45#
發(fā)表于 2025-3-29 10:17:29 | 只看該作者
Stepped Frequency Signal Processing,acks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100?kHz around a carrier under 2?MHz) even when attacking multi-GHz CPUs..We demonstrate the attacks’ feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds,
46#
發(fā)表于 2025-3-29 14:47:01 | 只看該作者
Kelly Ann Krawczyk,Bridgett A. Kingdely believed that exponent blinding would prevent any timing attack on RSA. At cost of significantly more timing measurements this paper extends the before-mentioned attacks to RSA with CRT when Montgomery’s multiplication algorithm and exponent blinding are applied. Simulation experiments are cond
47#
發(fā)表于 2025-3-29 17:27:41 | 只看該作者
48#
發(fā)表于 2025-3-29 22:03:16 | 只看該作者
Data Collection and Preprocessing,onfidentiality of the communications. In this paper we present an improved cryptanalysis approach which is more effective than the Nohl-Tews-Weinmann (NTW) attack and requires four times less plaintext material. Under the best conditions, our known plaintext attack requires only 3?min of communicati
49#
發(fā)表于 2025-3-30 02:17:25 | 只看該作者
https://doi.org/10.1007/978-3-662-48324-4Countermeasures; Cryptography; Fault attacks; Hardware security; Side-channel attacks; Authentication; Cry
50#
發(fā)表于 2025-3-30 07:44:18 | 只看該作者
978-3-662-48323-7International Association for Cryptologic Research 2015
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 17:57
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
泽库县| 东明县| 叙永县| 磐石市| 漯河市| 盐城市| 南丰县| 通城县| 克东县| 四子王旗| 商河县| 高清| 宜丰县| 酉阳| 海宁市| 常山县| 色达县| 金湖县| 洛隆县| 依兰县| 宁乡县| 临潭县| 霍林郭勒市| 华蓥市| 盘锦市| 龙山县| 镇巴县| 徐水县| 永安市| 石门县| 江川县| 外汇| 廊坊市| 慈利县| 衡阳市| 威海市| 信丰县| 临颍县| 永泰县| 颍上县| 建宁县|