>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Reverse Engineering相关记录26条 . 查询时间(0.093 秒)
Imagine standing in a lumberyard and being asked to build a house -- without blueprints or instructions of any kind. The materials are all in front of you, but that doesn't mean you have the first ide...
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). Unfortunately, some algorithm designers exploit this fact to avoid providing the algorit...
This paper presents a pipeline that has been developed to acquire a shape with particular features both under the geometric and radiometric aspects. In fact, the challenge was to build a 3D model of t...
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be impl...
Hardware manipulations pose a serious threat to numerous systems, ranging from myriads of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level,...
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Updat...
The Russian Federation’s standardization agency has recently published a hash function called Streebog and a 128-bit block cipher called Kuznyechik. Both of these algorithms use the same 8-bit S-Box...
The secret information, which is embedded in integrated circuit (IC) devices such as a smart card, has the risk of theft by reverse engineering (RE). The circuit design of IC can be stolen by the RE...
Dividing last level caches into slices is a popular method to prevent memory accesses from becoming a bottleneck on modern multicore processors. In order to assess and understand the benefits of cac...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resilience to attacks such as linear or differential cryptanalysis is well understood. In this paper, we i...
A main advantage of terrestrial laser scanning is the possibility to nearly simultaneously acquire the geometrical positions of millions of object points in 3D. However this is also the main bottle ne...
This research illustrates the experimentations accomplished in the field of Cultural Heritage aimed to the determination of the “total form” of the objects with a high resolution, using a simple and t...
This research would like to illustrate an experimental work carried out in the filed of Cultural Heritage, finalized to determine a complete object shape at very high resolution. The aim was to go bey...
There is a need to reverse engineer architectural hardware, with hinges and brackets being typical, for use in the restoration of buildings in which the original hardware is damaged. Another use for r...
The paper discusses the use of geometric constraints in a CAD model-based photogrammetric system. The CAD models are represented by CSG (Constructive Solid Geometry) models. The geometric primitives t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...