找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart Card Research and Advanced Applications; 15th International C Kerstin Lemke-Rust,Michael Tunstall Conference proceedings 2017 Springe

[复制链接]
楼主: gloomy
发表于 2025-3-23 11:48:27 | 显示全部楼层
Conference proceedings 2017lications, CARDIS 2016, held in Cannes, France, in November 2016. .The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart c
发表于 2025-3-23 14:09:46 | 显示全部楼层
发表于 2025-3-23 21:03:24 | 显示全部楼层
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking,nts. They aim to detect the so-called . (PoIs), which are time samples which (jointly) depend on some sensitive information (. secret key sub-parts), and exploit them to extract information. The extraction is done through the use of functions which combine the measurement time samples. Examples of c
发表于 2025-3-24 00:14:22 | 显示全部楼层
发表于 2025-3-24 04:48:40 | 显示全部楼层
发表于 2025-3-24 06:58:14 | 显示全部楼层
发表于 2025-3-24 10:43:54 | 显示全部楼层
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,gainst a wide range of sophisticated attacks. Lightweight cryptographic schemes such as the Speck cipher that was recently proposed by the NSA aim to solve some of these challenges. However, before using Speck in any practical application, sound protection against side-channel attacks must be in pla
发表于 2025-3-24 18:30:10 | 显示全部楼层
Concealing Secrets in Embedded Processors Designs, merely on cryptographic algorithms, and has either been implemented for particular hardware or software implementations. However, the drawbacks of protecting specific implementations are the lack of flexibility in terms of used algorithms, the impossibility to update protected hardware implementati
发表于 2025-3-24 20:16:09 | 显示全部楼层
发表于 2025-3-25 01:00:00 | 显示全部楼层
Logical Attacks on Secured Containers of the Java Card Platform,systematic evaluation of the security that these containers provide against logical attacks, for a number of cards from different manufacturers..Most cards we investigated do not appear to implement any integrity and confidentiality protection for these containers. For the cards that do, this paper
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 09:38
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表