搜索结果: 1-10 共查到“军事学 Branch”相关记录10条 . 查询时间(0.015 秒)
Bounds on the Differential Branch Number of Permutations
Permutation S-box differential branch number
2017/10/12
Nonlinear permutations (S-boxes) are key components in block ciphers. Differential branch number measures the diffusion power of a permutation. Differential branch number of nonlinear permutations of ...
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
BLISS branch tracing SPA
2017/6/5
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several w...
Feistel Like Construction of Involutory Binary Matrices With High Branch Number
Diffusion layer bitslice cipher hash function
2016/12/12
In this paper, we propose a generic method to construct involutory binary matrices from a three round Feistel scheme with a linear round function. We prove bounds on the maximum achievable branch numb...
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Fault attacks branch misses performance counters
2016/1/6
Performance monitors are provided in modern day computers for observing various features of the underlying microarchitectures. However the combination of underlying micro-architectural features and pe...
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Sliced Biclique cryptanalysis hash functions collision attack
2016/1/3
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN). This attack...
We propose a family of 6-to-4-bit S-boxes with linear branch number 3. Since they also fulfill various further desirable properties, such S-boxes can serve as a building block for various block cipher...
Countermeasures for the Simple Branch Prediction Analysis
Simple Branch Prediction key bits modern superscalar processors
2009/1/9
Branch Prediction Analysis has been proposed as an attack method
to obtain key bits from a cryptographic application. In this report, we
put forth several solutions to avoid or prevent this attack. ...
On the Power of Simple Branch Prediction Analysis
Branch Prediction Analysis Countermeasures Modular Exponentiation
2008/12/23
Very recently, a new software side-channel attack, called Branch Prediction Analysis
(BPA) attack, has been discovered and also demonstrated to be practically feasible on popular
commodity PC platfo...
Predicting Secret Keys via Branch Prediction
Branch Prediction Modular Exponentiation Montgomery Multiplication
2008/12/15
This paper presents a new software side-channel attack enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty payed (extra
clock cycles) for a mispredict...
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Side channel attacks branch prediction attacks cache eviction attacks Binary Extended Euclidean Algorithm
2008/9/17
Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leakage of “side-channel” informati...