搜索结果: 1-4 共查到“军队指挥学 cryptographic algorithms”相关记录4条 . 查询时间(0.124 秒)
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
Detection of cryptographic algorithms with grap
detection control flow graph reverse engineering
2017/11/27
The disassembled code of an executable program can be seen as a graph representing the possible sequence of instructions (Control Flow Graph). grap is a YARA-like tool, completely open-source, and abl...
Test Vector Leakage Assessment (TVLA) has been proposed as a method
of determining if a side-channel attack is feasible, for a given implementation
of a block cipher, by looking for leakage without ...
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
universal hash function word oriented LFSRs message authentication codes
2009/6/4
A new multi-linear universal hash family is described. Messages are sequences over a finite
field IFq while keys are sequences over an extension field IFqn. A linear map from IFqn to itself is used...