搜索结果: 1-15 共查到“军队指挥学 detection”相关记录50条 . 查询时间(0.187 秒)
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
cryptographic protocols SMC
2019/6/26
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead t...
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
side-channel analysis leakage detection security certification
2019/6/14
An established ingredient in the security evaluation of cryptographic devices is leakage detection, whereby physically observable characteristics such as the power consumption are measured during oper...
Secure multiparty PageRank algorithm for collaborative fraud detection
Multiparty computation PageRank fraud detection
2018/11/8
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and dat...
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
design of cryptographic primitives fault injection countermeasures side-channel attack
2018/8/10
We introduce a novel approach for designing symmetric ciphers to resist fault injection. The approach is fairly generic and applies to round functions of block ciphers, cryptographic permutations and ...
Non-Malleable Codes for Partial Functions with Manipulation Detection
non-malleable codes manipulation-detection codes tamper-resilient cryptography
2018/6/5
Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs (ICS '10) and its main application is the protection of cryptographic devices against tampering attacks on memory. In this work, ...
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Leakage-resilient AMD Algebraic Manipulation Detection Leakage resilient codes
2018/1/17
Algebraic Manipulation Detection (AMD) codes [CDF+08] are keyless message authentication codes that protect messages against additive tampering by the adversary assuming that the adversary cannot “see...
Detection of cryptographic algorithms with grap
detection control flow graph reverse engineering
2017/11/27
The disassembled code of an executable program can be seen as a graph representing the possible sequence of instructions (Control Flow Graph). grap is a YARA-like tool, completely open-source, and abl...
Early Detection and Analysis of Leakage Abuse Vulnerabilities
cryptanalysis efficiently searchable encryption encrypted databases
2017/11/1
In order to be useful in the real world, efficient cryptographic constructions often reveal, or ``leak,'' more information about their plaintext than one might desire. Up until now, the approach for a...
An attacker or evaluator can detect more information leakages if he improves the Signal-to-Noise Ratio (SNR) of power traces in his tests. For this purpose, pre-processings such as de-noise, distribut...
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Hardware Reverse Engineering Hardware Trojans Hardware Trojan Detection
2017/8/21
Hardware manipulations pose a serious threat to numerous systems, ranging from myriads of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level,...
Towards Sound and Optimal Leakage Detection Procedure
Side channel analysis leakage detection higher criticism
2017/4/5
Evaluation of side channel leakage for the embedded crypto systems requires sound leakage detection procedures. We relate the test vector leakage assessment (TVLA) procedure to the statistical minimum...
Cache-Base Application Detection in the Cloud Using Machine Learning
Cache Machine Learning Cloud
2017/3/21
Cross-VM attacks have emerged as a major threat on commercial clouds. These attacks commonly exploit hardware level leakages on shared physical servers. A co-located machine can readily feel the prese...
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
hash functions SHA-1 counter-cryptanalysis
2017/2/28
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 with a hash collision detection algorithm. That is,...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
AES differential fault analysis side-channel attacks
2016/12/8
Differential fault analysis attack is a kind of serious threat to cryptographic devices.
Previous protection schemes for crypto devices are not designed specifically against this kind of
attacks. At...