標(biāo)題: Titlebook: Smart Card Research and Advanced Applications; 15th International C Kerstin Lemke-Rust,Michael Tunstall Conference proceedings 2017 Springe [打印本頁] 作者: gloomy 時(shí)間: 2025-3-21 18:45
書目名稱Smart Card Research and Advanced Applications影響因子(影響力)
書目名稱Smart Card Research and Advanced Applications影響因子(影響力)學(xué)科排名
書目名稱Smart Card Research and Advanced Applications網(wǎng)絡(luò)公開度
書目名稱Smart Card Research and Advanced Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Smart Card Research and Advanced Applications被引頻次
書目名稱Smart Card Research and Advanced Applications被引頻次學(xué)科排名
書目名稱Smart Card Research and Advanced Applications年度引用
書目名稱Smart Card Research and Advanced Applications年度引用學(xué)科排名
書目名稱Smart Card Research and Advanced Applications讀者反饋
書目名稱Smart Card Research and Advanced Applications讀者反饋學(xué)科排名
作者: constitute 時(shí)間: 2025-3-21 22:33 作者: 容易做 時(shí)間: 2025-3-22 02:33
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,esulting design is a tiny crypto core that provides AES-like security in under 40 slices on a low-cost Xilinx Spartan 3 FPGA. The first-order side-channel resistant version of the same core needs less than 100 slices. Further, we validate the security of the protected core by state-of-the-art side-channel leakage detection tests.作者: Ptosis 時(shí)間: 2025-3-22 08:30 作者: 忘川河 時(shí)間: 2025-3-22 10:31 作者: patella 時(shí)間: 2025-3-22 15:16
Squeezing Polynomial Masking in Tower Fields,g schemes, to reduce both area and randomness requirements of higher-order polynomially masked implementations, with application to AES. We provide ASIC synthesis results up?to the . masking order and perform side-channel attacks on a Xilinx Spartan6 FPGA up?to the . masking order.作者: Insufficient 時(shí)間: 2025-3-22 20:39 作者: tendinitis 時(shí)間: 2025-3-22 23:34 作者: Cryptic 時(shí)間: 2025-3-23 03:32
Logical Attacks on Secured Containers of the Java Card Platform,efeated using decryption functionality that the platform itself offers, so that logical attacks can still retrieve plaintext keys and PINs..We also investigate the possibilities for type confusion to access the global APDU buffer and the presence of undocumented bytecode instructions.作者: 寄生蟲 時(shí)間: 2025-3-23 08:35
0302-9743 nce on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016. .The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deploym作者: DRILL 時(shí)間: 2025-3-23 11:48
Conference proceedings 2017lications, CARDIS 2016, held in Cannes, France, in November 2016. .The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart c作者: irreducible 時(shí)間: 2025-3-23 14:09 作者: 消毒 時(shí)間: 2025-3-23 21:03
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking,nts. They aim to detect the so-called . (PoIs), which are time samples which (jointly) depend on some sensitive information (. secret key sub-parts), and exploit them to extract information. The extraction is done through the use of functions which combine the measurement time samples. Examples of c作者: 不發(fā)音 時(shí)間: 2025-3-24 00:14 作者: 外面 時(shí)間: 2025-3-24 04:48 作者: 配置 時(shí)間: 2025-3-24 06:58 作者: Metamorphosis 時(shí)間: 2025-3-24 10:43
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,gainst a wide range of sophisticated attacks. Lightweight cryptographic schemes such as the Speck cipher that was recently proposed by the NSA aim to solve some of these challenges. However, before using Speck in any practical application, sound protection against side-channel attacks must be in pla作者: eucalyptus 時(shí)間: 2025-3-24 18:30
Concealing Secrets in Embedded Processors Designs, merely on cryptographic algorithms, and has either been implemented for particular hardware or software implementations. However, the drawbacks of protecting specific implementations are the lack of flexibility in terms of used algorithms, the impossibility to update protected hardware implementati作者: 殖民地 時(shí)間: 2025-3-24 20:16 作者: AMBI 時(shí)間: 2025-3-25 01:00
Logical Attacks on Secured Containers of the Java Card Platform,systematic evaluation of the security that these containers provide against logical attacks, for a number of cards from different manufacturers..Most cards we investigated do not appear to implement any integrity and confidentiality protection for these containers. For the cards that do, this paper 作者: 鋸齒狀 時(shí)間: 2025-3-25 03:48 作者: defray 時(shí)間: 2025-3-25 08:22
A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves,. Computations on these curves have been proven to be exception-free and easy to make constant-time. Unfortunately many standards define elliptic curves in the short Weierstrass model, where the above properties are harder to achieve. This is especially true when scalar blinding, a simple but widely作者: Fulminate 時(shí)間: 2025-3-25 12:22
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages,ads. Boolean masking is one extreme example of this tradeoff: its algebraic structure is as simple as can be (and so are its implementations), but it typically suffers more from implementation weaknesses. For example knowing one bit of each share is enough to know one bit of secret in this case. Inn作者: 雀斑 時(shí)間: 2025-3-25 19:40 作者: needle 時(shí)間: 2025-3-25 20:46
PRNGs for Masking Applications and Their Mapping to Evolvable Hardware,s work, we focus on PRNGs that are suitable for generating masks and secret shares. Such generators should be light-weight and have a high throughput with good statistical properties. As a proof-of-concept, we present three novel hardware architectures that have an increasing level of prediction res作者: foliage 時(shí)間: 2025-3-26 02:42
Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software,ations. This has been shown to be a threat to cryptographic software whose execution flow depends on the processed secrets. Testing implementations for these dependencies, or ., is essential to develop protected cryptographic software. In this work, we present an automated testing methodology that a作者: 不朽中國 時(shí)間: 2025-3-26 05:34
An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks,ntly have good features to resist these attacks. First, some prominent fault models (e.g. where an adversary flips bits in an implementation) are ineffective against LPN. Second, attacks taking advantage of more advanced fault models (e.g. where an adversary sets bits in an implementation) require s作者: Albinism 時(shí)間: 2025-3-26 09:20
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/868620.jpg作者: CAGE 時(shí)間: 2025-3-26 16:35 作者: PHIL 時(shí)間: 2025-3-26 19:50 作者: dainty 時(shí)間: 2025-3-27 00:39
Smart Card Research and Advanced Applications978-3-319-54669-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Outwit 時(shí)間: 2025-3-27 01:28
Kerstin Lemke-Rust,Michael TunstallIncludes supplementary material: 作者: corn732 時(shí)間: 2025-3-27 06:49 作者: Merited 時(shí)間: 2025-3-27 09:30
Conference proceedings 2017lications, CARDIS 2016, held in Cannes, France, in November 2016. .The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart cards or smart personal devices..作者: indenture 時(shí)間: 2025-3-27 16:52
ns, .Local Climate Action Planning. guides preparers of CAPs through the entire plan development process, identifying the key considerations and choices that must be made in order to assure that a plan is both workable and effective..978-1-61091-201-3作者: JIBE 時(shí)間: 2025-3-27 21:37 作者: Diuretic 時(shí)間: 2025-3-27 23:51
Benoit Feix,Andjy Ricart,Benjamin Timon,Lucille Tordellans, .Local Climate Action Planning. guides preparers of CAPs through the entire plan development process, identifying the key considerations and choices that must be made in order to assure that a plan is both workable and effective..978-1-61091-201-3作者: 騎師 時(shí)間: 2025-3-28 04:48
Houssem Maghrebi,Julien Bringerns, .Local Climate Action Planning. guides preparers of CAPs through the entire plan development process, identifying the key considerations and choices that must be made in order to assure that a plan is both workable and effective..978-1-61091-201-3作者: Adenocarcinoma 時(shí)間: 2025-3-28 10:20 作者: 切碎 時(shí)間: 2025-3-28 12:39 作者: Excise 時(shí)間: 2025-3-28 15:55 作者: 致詞 時(shí)間: 2025-3-28 20:00 作者: 內(nèi)部 時(shí)間: 2025-3-29 00:41
Sergei Volokitin,Erik Pollets and their legitimate achievement of comparable living standards to those in the West without a restructuring of the energy system, there will be no possibility of mitigating climate change. Instead, various factors will conspire to produce a gloomy picture: pressure on natural resources, togethe作者: 空氣傳播 時(shí)間: 2025-3-29 06:52 作者: Intersect 時(shí)間: 2025-3-29 10:36 作者: 使成整體 時(shí)間: 2025-3-29 13:33
Weijia Wang,Fran?ois-Xavier Standaert,Yu Yu,Sihang Pu,Junrong Liu,Zheng Guo,Dawu Guem has improved communication in the heat island literature, and enhanced interdisciplinary exchange of heat island properties, datasets, and methodologies. In recent years, use of LCZs has evolved well beyond the observational study of heat islands, to include mapping and modelling of urban environ作者: 擴(kuò)張 時(shí)間: 2025-3-29 15:43
Fabrizio De Santis,Tobias Bauer,Georg Sigltrend that aims to leverage the strengths of both GIS and remote sensing techniques to improve the accuracy and efficiency of LCZ mapping. LCZ classification maps and databases are increasingly applied in climatic planning as information support for decision-making.作者: 呼吸 時(shí)間: 2025-3-29 20:25 作者: helper-T-cells 時(shí)間: 2025-3-30 03:34
Andreas Zankl,Johann Heyszl,Georg Siglcioeconomic Pathways (SSPs) using the Guangdong-Hong Kong-Macao Greater Bay Area as a case study and explore the impact of land management policies on the LCZ spatial pattern. The results show that urbanization in this mega-region during the past decades includes horizontal expansion and vertical de作者: 少量 時(shí)間: 2025-3-30 06:59 作者: fructose 時(shí)間: 2025-3-30 08:27
and discussed in this book. At first, a general background of urbanization and its impacts is introduced, and the basic knowledge of LCZ. The second part introduces the methodology and techniques of LCZ data development. In the third part, various applications of LCZ are demonstrated in practice, in作者: Dappled 時(shí)間: 2025-3-30 13:14 作者: bifurcate 時(shí)間: 2025-3-30 19:29 作者: 自制 時(shí)間: 2025-3-30 22:30
Concealing Secrets in Embedded Processors Designs,gn can be synthesized to defeat SCA attacks of arbitrary attack order. Once synthesized, the processor protects the computation on security-sensitive data against side-channel leakage. The benefits of our approach are (1) flexibility and updatability, (2) faster development of SCA-protected systems,