找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart Card Research and Advanced Applications; 13th International C Marc Joye,Amir Moradi Conference proceedings 2015 Springer Internationa

[复制链接]
楼主: 能干
发表于 2025-3-28 14:58:46 | 显示全部楼层
Caml Crush: A PKCS#11 Filtering Proxy art attacks. This is the first approach that is immediately applicable to commercially available products. We provide a fully functional open source implementation with an extensible filter engine effectively shielding critical resources. This yields additional advantages to using . that go beyond classical PKCS#11 weakness mitigations.
发表于 2025-3-28 21:56:07 | 显示全部楼层
Algorithms for Outsourcing Pairing Computationecure, and do not rely on any hardness assumptions. Both protocols are more efficient than the actual computation of the pairing by the restricted device and in particular they are more efficient than all previous proposals.
发表于 2025-3-29 02:58:40 | 显示全部楼层
发表于 2025-3-29 04:27:29 | 显示全部楼层
Study of a Novel Software Constant Weight Implementationht assumption. It reveals that the countermeasure remains as good as several well-known masking countermeasures. Moreover, the proposed countermeasure offers the possibility to detect some classes of faults.
发表于 2025-3-29 07:17:33 | 显示全部楼层
On the Cost of Lazy Engineering for Masked Software Implementationsssembly generation. For this purpose, our first contribution is a simple reduction from security proofs obtained in a (usual but not always realistic) model where leakages depend on the intermediate variables manipulated by the target device, to security proofs in a (more realistic) model where the
发表于 2025-3-29 13:54:26 | 显示全部楼层
发表于 2025-3-29 15:56:46 | 显示全部楼层
Combining Leakage-Resilient PRFs and Shufflingced at CHES 2012. We first detail is performances. Then we analyze it against standard differential power analysis and discuss the different parameters influencing its security bounds. Finally, we put forward that its implementation in 8-bit microcontrollers can provide a better security vs. perform
发表于 2025-3-29 20:47:28 | 显示全部楼层
Double Level Montgomery Cox-Rower Architecture, New Boundsplication at classical cryptography security levels (NIST curves). Our implementation uses 35 % less LUTs compared to the state of the art generic implementation of ECC using RNS for the same performance [.]. We also slightly improve the computation time (latency) and our implementation shows best r
发表于 2025-3-30 01:07:02 | 显示全部楼层
发表于 2025-3-30 04:38:22 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-24 01:13
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表