发表于 2025-3-28 15:34:24

Ondine Bradbury,Daniela AcquaroMersenne-like primes, the proposed RNS algorithm requires 2 times less moduli than the state-of-art ones, leading to 4 times less precomputations and about 2 times less operations. FPGA implementations of our algorithm are presented, with area reduced up to 46 %, for a time overhead less than 10 %.

Mere仅仅 发表于 2025-3-28 20:31:34

http://reply.papertrans.cn/25/2406/240545/240545_42.png

Aggrandize 发表于 2025-3-29 01:30:04

The Application of the WBE Theory,omewhat homomorphic encryption scheme YASHE. Our implementation is the first FPGA implementation that is designed for evaluating functions on homomorphically encrypted data (up to a certain multiplicative depth) and we illustrate this capability by evaluating the SIMON-64/128 block cipher in the enc

松驰 发表于 2025-3-29 06:43:33

http://reply.papertrans.cn/25/2406/240545/240545_44.png

osteoclasts 发表于 2025-3-29 10:17:29

Stepped Frequency Signal Processing,acks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100 kHz around a carrier under 2 MHz) even when attacking multi-GHz CPUs..We demonstrate the attacks’ feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds,

Pudendal-Nerve 发表于 2025-3-29 14:47:01

Kelly Ann Krawczyk,Bridgett A. Kingdely believed that exponent blinding would prevent any timing attack on RSA. At cost of significantly more timing measurements this paper extends the before-mentioned attacks to RSA with CRT when Montgomery’s multiplication algorithm and exponent blinding are applied. Simulation experiments are cond

巨大没有 发表于 2025-3-29 17:27:41

http://reply.papertrans.cn/25/2406/240545/240545_47.png

cutlery 发表于 2025-3-29 22:03:16

Data Collection and Preprocessing,onfidentiality of the communications. In this paper we present an improved cryptanalysis approach which is more effective than the Nohl-Tews-Weinmann (NTW) attack and requires four times less plaintext material. Under the best conditions, our known plaintext attack requires only 3 min of communicati

deface 发表于 2025-3-30 02:17:25

https://doi.org/10.1007/978-3-662-48324-4Countermeasures; Cryptography; Fault attacks; Hardware security; Side-channel attacks; Authentication; Cry

interrogate 发表于 2025-3-30 07:44:18

978-3-662-48323-7International Association for Cryptologic Research 2015
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cryptographic Hardware and Embedded Systems -- CHES 2015; 17th International W Tim Güneysu,Helena Handschuh Conference proceedings 2015 Int