搜索结果: 1-6 共查到“知识库 军事学 Accelerators”相关记录6条 . 查询时间(0.078 秒)
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
hardware security logic obfuscation hardware accelerator
2019/9/19
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the inef...
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
XMSS hash-based signatures post-quantum cryptography
2019/1/2
We describe a hardware-software co-design for the hash-based post-quantum signature scheme XMSS on a RISC-V embedded processor. We provide software optimizations for the XMSS reference implementation ...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
Public Key Cryptography Post-quantum Cryptography Lattice-based Cryptography
2018/6/25
Post Quantum Lattice-Based Cryptography (LBC) schemes are increasingly gaining attention in traditional and emerging security problems, such as encryption, digital signature, key exchange, homomorphic...
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
implementation elliptic curve cryptography individualization of cryptographic hardware architectures
2016/1/9
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally prepa...
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m
modified Tate pairing finite field arithmetic elliptic curve
2009/6/3
In this article we propose a study of the modified Tate pairing
in characteristics two and three. Starting from the T pairing introduced
by Barreto et al. [1], we detail various algorithmic improvem...