Cabg318 发表于 2025-3-27 00:12:43
http://reply.papertrans.cn/25/2406/240547/240547_31.pngflaunt 发表于 2025-3-27 02:55:06
High-Performance Concurrent Error Detection Scheme for AES Hardwareances of AES hardware without error detection were 1.66 Gbps @ 12.9 Kgates for the compact version and 4.22 Gbps @ 30.7 Kgates for the high-speed version. There is only a slight difference between the performances with and without error detection. The performance overhead caused by the error detecti陈腐的人 发表于 2025-3-27 07:53:28
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basispreviously reported ones. It is shown that the FPGA implementations of the S-box using normal basis representation in composite fields outperform the traditional ones using polynomial basis for both with and without fault detection capability.织物 发表于 2025-3-27 11:26:00
http://reply.papertrans.cn/25/2406/240547/240547_34.pngPtsd429 发表于 2025-3-27 17:20:31
http://reply.papertrans.cn/25/2406/240547/240547_35.png欢腾 发表于 2025-3-27 18:45:02
http://reply.papertrans.cn/25/2406/240547/240547_36.png野蛮 发表于 2025-3-27 23:49:15
http://reply.papertrans.cn/25/2406/240547/240547_37.png连接 发表于 2025-3-28 03:36:35
A Design for a Physical RNG with Robust Entropy Estimatorss based on a pair of noisy diodes. The main contribution of this paper is the formulation and the analysis of the corresponding stochastic model which interestingly also fits to other RNG designs. We prove a theorem that provides tight lower bounds for the entropy per random bit, and we apply our results to a prototype of a particular physical RNG.背景 发表于 2025-3-28 06:44:55
Time-Area Optimized Public-Key Engines: ,-Cryptosystems as Replacement for Elliptic Curves? s parameter. Moreover, a general framework for implementing small-field .-schemes in hardware is proposed which includes a systolic architecture performing Gaussian elimination over composite binary fields.流眼泪 发表于 2025-3-28 14:04:32
Hash Functions and RFID Tags: Mind the Gapcribe the most compact hash functions available today, our work serves to highlight the difficulties in designing lightweight hash functions and (echoing ) we urge caution when routinely appealing to a hash function in an RFID-tag protocol.