Sad570 发表于 2025-3-30 12:12:46

http://reply.papertrans.cn/25/2406/240554/240554_51.png

和音 发表于 2025-3-30 15:03:55

http://reply.papertrans.cn/25/2406/240554/240554_52.png

aesthetician 发表于 2025-3-30 20:19:27

Hamed Almuhrzi,Nataša Slak Valeklities to provide data obfuscations, keyed hardware permutations can provide compact design and easy diversification. We discuss the efficiency of such primitives, and we give several examples of implementations, along with proofs of effectively large key-space.

eczema 发表于 2025-3-30 21:56:10

http://reply.papertrans.cn/25/2406/240554/240554_54.png

建筑师 发表于 2025-3-31 01:21:23

Lecture Notes in Electrical Engineeringro’s provably secure generator, proposed at Crypto 2000, with more standard techniques based on the . compression function. Our results show how the presence of hardware support for modular multiplication and exponentiation affects these algorithms.

CHURL 发表于 2025-3-31 06:01:28

http://reply.papertrans.cn/25/2406/240554/240554_56.png

原始 发表于 2025-3-31 12:40:28

Çetin K. Koç,David Naccache,Christof PaarIncludes supplementary material:

细查 发表于 2025-3-31 15:24:47

http://reply.papertrans.cn/25/2406/240554/240554_58.png

聋子 发表于 2025-3-31 19:43:33

Soufiane Naim,Noureddine MoumkineGeneral problems and difficulties are discussed which have to be considered when testing true random numbers. Requirements are formulated which appropriate online tests should fulfill. Then we propose an online test procedure which meets these requirements.

Malleable 发表于 2025-3-31 23:36:40

Efficient Online Tests for True Random Number GeneratorsGeneral problems and difficulties are discussed which have to be considered when testing true random numbers. Requirements are formulated which appropriate online tests should fulfill. Then we propose an online test procedure which meets these requirements.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cryptographic Hardware and Embedded Systems - CHES 2001; Third International Çetin K. Koç,David Naccache,Christof Paar Conference proceedi