找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptographic Hardware and Embedded Systems -- CHES 2015; 17th International W Tim Güneysu,Helena Handschuh Conference proceedings 2015 Int

[復(fù)制鏈接]
樓主: 棕櫚等
41#
發(fā)表于 2025-3-28 15:34:24 | 只看該作者
Ondine Bradbury,Daniela AcquaroMersenne-like primes, the proposed RNS algorithm requires 2 times less moduli than the state-of-art ones, leading to 4 times less precomputations and about 2 times less operations. FPGA implementations of our algorithm are presented, with area reduced up to 46?%, for a time overhead less than 10?%.
42#
發(fā)表于 2025-3-28 20:31:34 | 只看該作者
43#
發(fā)表于 2025-3-29 01:30:04 | 只看該作者
The Application of the WBE Theory,omewhat homomorphic encryption scheme YASHE. Our implementation is the first FPGA implementation that is designed for evaluating functions on homomorphically encrypted data (up?to a certain multiplicative depth) and we illustrate this capability by evaluating the SIMON-64/128 block cipher in the enc
44#
發(fā)表于 2025-3-29 06:43:33 | 只看該作者
45#
發(fā)表于 2025-3-29 10:17:29 | 只看該作者
Stepped Frequency Signal Processing,acks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100?kHz around a carrier under 2?MHz) even when attacking multi-GHz CPUs..We demonstrate the attacks’ feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds,
46#
發(fā)表于 2025-3-29 14:47:01 | 只看該作者
Kelly Ann Krawczyk,Bridgett A. Kingdely believed that exponent blinding would prevent any timing attack on RSA. At cost of significantly more timing measurements this paper extends the before-mentioned attacks to RSA with CRT when Montgomery’s multiplication algorithm and exponent blinding are applied. Simulation experiments are cond
47#
發(fā)表于 2025-3-29 17:27:41 | 只看該作者
48#
發(fā)表于 2025-3-29 22:03:16 | 只看該作者
Data Collection and Preprocessing,onfidentiality of the communications. In this paper we present an improved cryptanalysis approach which is more effective than the Nohl-Tews-Weinmann (NTW) attack and requires four times less plaintext material. Under the best conditions, our known plaintext attack requires only 3?min of communicati
49#
發(fā)表于 2025-3-30 02:17:25 | 只看該作者
https://doi.org/10.1007/978-3-662-48324-4Countermeasures; Cryptography; Fault attacks; Hardware security; Side-channel attacks; Authentication; Cry
50#
發(fā)表于 2025-3-30 07:44:18 | 只看該作者
978-3-662-48323-7International Association for Cryptologic Research 2015
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 17:57
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
平湖市| 綦江县| 马关县| 营山县| 商洛市| 曲沃县| 白玉县| 彭山县| 耒阳市| 桑日县| 江北区| 淮滨县| 敦化市| 南郑县| 武冈市| 叙永县| 福建省| 内丘县| 郧西县| 晋中市| 日土县| 江津市| 自贡市| 大名县| 云霄县| 朝阳市| 梓潼县| 会东县| 绥棱县| 赫章县| 清水河县| 佛坪县| 永宁县| 怀柔区| 博爱县| 湾仔区| 广元市| 醴陵市| 确山县| 泾川县| 化州市|