Arrhythmia 发表于 2025-3-28 16:06:01

http://reply.papertrans.cn/47/4653/465264/465264_41.png

perjury 发表于 2025-3-28 19:11:42

A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASHfor the use on low-cost smartcards..We show theoretically how differential power analysis (DPA) can be used to reveal the complete secret key in possible smartcard implementations of FLASH and SFLASH. To our knowledge no smartcard implementations of these schemes are available at the moment, so an e

精密 发表于 2025-3-29 00:16:37

http://reply.papertrans.cn/47/4653/465264/465264_43.png

Acquired 发表于 2025-3-29 05:03:55

http://reply.papertrans.cn/47/4653/465264/465264_44.png

Exploit 发表于 2025-3-29 07:15:37

http://reply.papertrans.cn/47/4653/465264/465264_45.png

人类学家 发表于 2025-3-29 11:58:00

http://reply.papertrans.cn/47/4653/465264/465264_46.png

Individual 发表于 2025-3-29 15:36:35

http://reply.papertrans.cn/47/4653/465264/465264_47.png

踉跄 发表于 2025-3-29 21:19:03

http://reply.papertrans.cn/47/4653/465264/465264_48.png

清真寺 发表于 2025-3-30 00:34:24

An Approach to the Obfuscation of Control-Flow of Sequential Computer Programstain a family .. of obfuscated programs such that the problem of checking . for .. is at least as hard as .. We show how this technique works by taking for . the acceptance problem for linear bounded Turing machines, which is known to be ..

诽谤 发表于 2025-3-30 05:33:38

A Practical and Effective Approach to Large-Scale Automated Linguistic Steganographyevious approach that used sentence models and large dictionaries of words classified by part-of-speech . By using an “extensible contextual template” approach combined with a synonymbased replacement strategy, much more realistic text is generated than was possible with ..
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security; 4th International Co George I. Davida,Yair Frankel Conference proceedings 2001 Springer-Verlag Berlin Heidelberg 2001