找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart Card Research and Advanced Applications; 13th International C Marc Joye,Amir Moradi Conference proceedings 2015 Springer Internationa

[复制链接]
楼主: 能干
发表于 2025-3-25 06:26:01 | 显示全部楼层
Conference proceedings 2015d from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.
发表于 2025-3-25 07:52:31 | 显示全部楼层
发表于 2025-3-25 14:37:41 | 显示全部楼层
Balanced Encoding to Mitigate Power Analysis: A Case Studyel. To study the practical relevance of the proposed countermeasure, it is applied to a software implementation of the block cipher Prince. This case study allows us to give realistic values for resulting implementation overheads as well as for the resulting side channel protection levels that can be achieved in realistic implementation scenarios.
发表于 2025-3-25 18:45:27 | 显示全部楼层
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bitsmputationally and help the profiling phase to converge faster. We show how these ideas can also be applied to implement stochastic models more efficiently, and we also show that they can be applied and evaluated even for more than eight unknown data bits at once.
发表于 2025-3-25 23:45:21 | 显示全部楼层
0302-9743 nce on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures
发表于 2025-3-26 04:08:02 | 显示全部楼层
发表于 2025-3-26 06:27:29 | 显示全部楼层
Memory Forensics of a Java Card Dumpta structure of the card. Such a reverse engineering process is costly and prone to errors. Currently there are no tools available to help the process. We propose here an approach to find in the raw data obtained after a dump, the area containing the code and the data. Then, once the code area has b
发表于 2025-3-26 12:17:19 | 显示全部楼层
Heap , Hop! Heap Is Also Vulnerablen was not performed, thus allowing to obtain dynamically a type confusion. To mitigate such attacks, typed stack have been introduced on recent smart card. We propose here a new attack path for performing a type confusion even in presence of a typed stack. Then we propose using a Fault Tree Analysis
发表于 2025-3-26 14:23:52 | 显示全部楼层
发表于 2025-3-26 18:18:15 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-24 00:52
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表