搜索结果: 1-3 共查到“军队指挥学 tampering attacks”相关记录3条 . 查询时间(0.077 秒)
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
After-the-Fact Post-challenge Entropic PKE
2018/11/13
In this paper, we introduce a new framework for constructing public-key encryption (PKE) schemes resilient to joint post-challenge/after-the-fact leakage and tampering attacks in the bounded leakage a...
Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Tampering Extractors Adversarial Learning
2017/9/28
Austrin, Chung, Mahmoody, Pass and Seth (Crypto'14) studied the notion of bitwise pp-tampering attacks over randomized algorithms in which an efficient `virus' gets to control each bit of the randomne...
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
field multiplication individualizing electrical circuit of multiplier power traces
2015/12/30
Side channel and fault attacks take advantage from the fact that the
behavior of crypto implementations can be observed and provides hints that
simplify revealing keys. In a real word a lot of devic...