搜索结果: 1-15 共查到“SCA”相关记录19条 . 查询时间(0.078 秒)
Combining ability from complete diallel design of Camellia oleifera: Implications for the utility of GCA and SCA in oil-related traits breeding
油茶 油脂性状 遗传差异
2024/5/10
中国散裂中子源(CSNS)反角白光中子束线(Back-n)对中子核数据测量和核技术应用等多个领域均有重要意义。为监测其中子束斑轮廓、束流密度及束流能量,研制了由镀硼微网格气体(Micromegas)探测器构成的束流剖面监测装置,并通过测量中子的飞行时间(TOF)来获得能量信息。
Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or ...
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
side channel leakage assessment deep learning
2019/5/21
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequent...
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
side-channel analysis Threshold Implementation AES
2018/11/12
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Polynomial direct sum masking to protect against both SCA and FIA
Masking countermeasure Error correcting codes Side channel attack
2018/6/5
Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the nineties, many works have shown tha...
A First-Order SCA Resistant AES without Fresh Randomness
side-channel analysis threshold implementation randomness
2018/3/6
Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting embedded devices against Side-Channel Analysis (SCA) attacks has been a major research effort. Even though many diffe...
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitch non-completeness threshold implementation
2017/12/19
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitc...
Profiled SCA with a New Twist: Semi-supervised Learning
Side-channel attacks Profiled scenario Machine learning
2017/11/13
Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains ac- cess of a profiling device to build a precise model which is used to...
Analysis Of Variance and CPA in SCA
SCA AOV CPA
2016/1/7
This paper introduces Side-Channel Analysis results obtained on an unprotected circuit characterized by a surprisingly non-linear leakage. While in such a case, Correlation Power Analysis is not adapt...
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
SCA Lightweight Cryptography Sponge functions
2016/1/3
PHOTON is a lightweight hash function which was proposed
by Guo et al. in CRYPTO 2011. This is used in low-resource ubiquitous
computing devices such as RFID tags, wireless sensor nodes, smart cards...
基于SCA规范的DNC系统及其实现
服务组件架构 组合件 面向服务架构
2009/10/21
异构和集成是长期困扰DNC系统的两大难题,服务组件架构(Service Component Architecture,简记SCA)为解决这两大难题提供了良好的技术规范和解决方案.通过参考各种文献和商业DNC系统,归纳出了DNC系统的主要业务功能,并在此基础上,提出了基于SCA规范的DNC系统模型,模型分为四层:向其它应用提供服务接口的应用层、提供业务功能服务的服务层、为服务提供构件的组合件层、为构...
基于SCA的遗留系统移植研究与实现
面向服务架构 遗留系统 服务组件框架
2009/9/27
针对传统遗留系统在面向服务计算移植过程中存在的重复性和多样性问题,提出一种基于服务组件框架(SCA)的遗留系统移植方案,将遗留系统移植到SCA组件系统中,通过python扩展生成器生成可以被该脚本调用的模块,在硬件平台上进行模拟,实验结果表明,该方案是可行的,能够避免因面向服务实现形式的差异而造成的重复移植。