笔记 发表于 2025-3-21 20:07:56

书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0240548<br><br>        <br><br>书目名称Cryptographic Hardware and Embedded Systems -- CHES 2011读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0240548<br><br>        <br><br>

柔美流畅 发表于 2025-3-22 00:16:57

FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control flip-flops. Metastability is achieved by using precise programmable delay lines (PDL) that accurately equalize the signal arrival times to flip-flops. The PDLs are capable of adjusting signal propagation delays with resolutions higher than fractions of a pico second. In addition, a real time monito

SOB 发表于 2025-3-22 00:37:49

http://reply.papertrans.cn/25/2406/240548/240548_3.png

arthroplasty 发表于 2025-3-22 05:22:48

http://reply.papertrans.cn/25/2406/240548/240548_4.png

桶去微染 发表于 2025-3-22 11:42:46

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols is nowadays an important topic. In parallel, another class of attacks, called ., have been investigated which exploit the hardware glitches phenomena occurring during the physical execution of algorithms. We introduce in this paper a circuit model that encompasses sufficient conditions to resist gl

爱了吗 发表于 2025-3-22 16:18:25

Protecting AES with Shamir’s Secret Sharing Schemelock cipher implementations is masking, which randomizes the variables to be protected by combining them with one or several random values. In this paper, we propose an original masking scheme based on Shamir’s Secret Sharing scheme  as an alternative to Boolean masking. We detail its implementa

爱了吗 发表于 2025-3-22 20:38:45

http://reply.papertrans.cn/25/2406/240548/240548_7.png

overwrought 发表于 2025-3-22 23:41:06

http://reply.papertrans.cn/25/2406/240548/240548_8.png

SLING 发表于 2025-3-23 01:34:11

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Orderult injection, these points turn into points of very low order. Using side channel information we deduce when the point at infinity occurs during the scalar multiplication, which leaks information about the secret key. In the best case, our attack breaks a simple and differential side channel analys

激怒 发表于 2025-3-23 08:02:15

http://reply.papertrans.cn/25/2406/240548/240548_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Cryptographic Hardware and Embedded Systems -- CHES 2011; 13th International W Bart Preneel,Tsuyoshi Takagi Conference proceedings 2011 Int