搜索结果: 1-15 共查到“军事学 Software”相关记录78条 . 查询时间(0.125 秒)
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
hardware security logic obfuscation hardware accelerator
2019/9/19
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the inef...
Efficient and secure software implementations of Fantomas
LS-Design Fantomas side-channel resistance
2019/8/8
In this paper, the efficient software implementation and side-channel resistance of the LS-Design construction is studied through a series of software implementations of the Fantomas block cipher, one...
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
Automated software protection for the masses against side-channel attacks
Side-channel attack hiding polymorphism
2018/12/19
We present an approach and a tool to answer the need for effective, generic and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so t...
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
复旦大学计算机科学与技术学院信息安全课件 Software Security。
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
maskVerif: a formal tool for analyzing software and hardware masked implementations
Glitches Masking Formal verification
2018/6/5
Masking is a popular countermeasure for protecting both hardware and software implementations against differential power analysis. A main strength of software masking is that its security guarantees c...
Threshold Implementation in Software - Case Study of PRESENT
Side-Channel Analysis Boolean masking Threshold Implementation
2018/3/6
Masking is one of the predominantly deployed countermeasures in order to prevent side-channel analysis (SCA) attacks. Over the years, various masking schemes have been proposed. However, the implement...
Fault Resilient Encoding Schemes in Software: How Far Can We Go?
software encoding schemes fault attacks countermeasures
2018/3/5
Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of counterme...
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Code-based cryptosystems MDPC
2018/1/2
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based on problems that remain intractable even...
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
implementation side-channel attacks
2018/1/2
Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version ...
Montgomery Arithmetic from a Software Perspective
Montgomery Arithmetic Software Perspective
2017/11/1
This chapter describes Peter L. Montgomery's modular multiplication method and the various improvements to reduce the latency for software implementations on devices which have access to many computat...
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
SIDH protocol Montgomery ladder post-quantum cryptography
2017/10/19
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol has positioned itself as a promising candidate for post-quantum cryptography. On...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists of three components: i. a verified compiler (CircGen) that translates C programs into Boolean circui...