找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptographic Hardware and Embedded Systems -- CHES 2015; 17th International W Tim Güneysu,Helena Handschuh Conference proceedings 2015 Int

[复制链接]
楼主: 棕榈等
发表于 2025-3-28 15:34:24 | 显示全部楼层
Ondine Bradbury,Daniela AcquaroMersenne-like primes, the proposed RNS algorithm requires 2 times less moduli than the state-of-art ones, leading to 4 times less precomputations and about 2 times less operations. FPGA implementations of our algorithm are presented, with area reduced up to 46 %, for a time overhead less than 10 %.
发表于 2025-3-28 20:31:34 | 显示全部楼层
发表于 2025-3-29 01:30:04 | 显示全部楼层
The Application of the WBE Theory,omewhat homomorphic encryption scheme YASHE. Our implementation is the first FPGA implementation that is designed for evaluating functions on homomorphically encrypted data (up to a certain multiplicative depth) and we illustrate this capability by evaluating the SIMON-64/128 block cipher in the enc
发表于 2025-3-29 06:43:33 | 显示全部楼层
发表于 2025-3-29 10:17:29 | 显示全部楼层
Stepped Frequency Signal Processing,acks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100 kHz around a carrier under 2 MHz) even when attacking multi-GHz CPUs..We demonstrate the attacks’ feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds,
发表于 2025-3-29 14:47:01 | 显示全部楼层
Kelly Ann Krawczyk,Bridgett A. Kingdely believed that exponent blinding would prevent any timing attack on RSA. At cost of significantly more timing measurements this paper extends the before-mentioned attacks to RSA with CRT when Montgomery’s multiplication algorithm and exponent blinding are applied. Simulation experiments are cond
发表于 2025-3-29 17:27:41 | 显示全部楼层
发表于 2025-3-29 22:03:16 | 显示全部楼层
Data Collection and Preprocessing,onfidentiality of the communications. In this paper we present an improved cryptanalysis approach which is more effective than the Nohl-Tews-Weinmann (NTW) attack and requires four times less plaintext material. Under the best conditions, our known plaintext attack requires only 3 min of communicati
发表于 2025-3-30 02:17:25 | 显示全部楼层
https://doi.org/10.1007/978-3-662-48324-4Countermeasures; Cryptography; Fault attacks; Hardware security; Side-channel attacks; Authentication; Cry
发表于 2025-3-30 07:44:18 | 显示全部楼层
978-3-662-48323-7International Association for Cryptologic Research 2015
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-29 12:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表