搜索结果: 1-15 共查到“军事学 low-cost”相关记录19条 . 查询时间(0.078 秒)
SPAE a mode of operation for AES on low-cost hardware
secret-key cryptography AES block ciphers
2019/9/16
We propose SPAE, a single pass, patent free, authenticated encryption with associated data (AEAD) for AES. The algorithm has been developped to address the needs of a growing trend in IoT systems: sto...
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Monero Privacy Traceability
2019/5/13
Monero is one of the first and most popular cryptocurrencies to address privacy issues of other crypto coins such as Bitcoin. Monero has a market capitalization of over one billion US dollars, and is ...
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
MPC cryptographic protocols
2017/3/6
In this work, we present a new universally composable, actively secure, constant round multi-party protocol for generating BMR garbled circuits with free-XOR and reduced costs. Specifically, the cost ...
Robust, low-cost, auditable random number generation for embedded system security
hardware RNG pseudo-randomness
2016/12/9
This paper presents an architecture for a discrete, high-entropy hardware random number generator. Because it is constructed out of simple hardware components, its operation is transparent and auditab...
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
FPGA WPA2 Security
2016/6/3
WPA2-Personal is widely used to protect Wi-Fi networks against illicit access. While attackers typically use GPUs to speed up the discovery of weak network passwords, attacking random passwords is con...
Low-Cost Concurrent Error Detection for GCM and CCM
concurrent error detection fault attack reliability, GCM
2016/1/6
In many applications, encryption alone does not provide enough security.
To enhance security, dedicated authenticated encryption (AE) mode are invented.
Galios Counter Mode (GCM) and Counter with CB...
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
lightweight cryptography block cipher
2015/12/23
Designing block ciphers targeting resource constrained 8-bit
CPUs is a challenging problem. There are many recent lightweight ciphers
designed for better performance in hardware. On the other hand,
...
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
ECC HCCA countermeasure
2015/12/22
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis resistant elliptic curve cryptosystems involving unified algorithms, for e.g. Edward curve unified fo...
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Authentication Yoking-Proof
2014/3/11
Peris-Lopez et al. recently provides some guidelines that should be followed to design a secure yoking-proof protocol. In addition, conforming to those guidelines and EPC C1 G2, they presented a yokin...
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
Tweakable enciphering scheme stream ciphers
2014/3/12
The problem of securing data present on USB memories and SD cards has not been adequately addressed in the cryptography literature. While the formal notion of a tweakable enciphering scheme (TES) is w...
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers
applications / zero-knowledge privacy metering microcontrollers
2012/3/23
Smart meters that track fine-grained electricity usage and implement sophisticated usage-based billing policies, e.g., based on time-of-use, are a key component of recent smart grid initiatives that a...
Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
Dishonest Majority Passive to Active Security Low Cost
2010/7/13
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal of this paper is th...
Aumann and Lindell defined security against covert attacks,
where the adversary is malicious, but is only caught cheating with a
certain probability, where the idea is that in many real-world cases,...
A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
RAM Requirements Various SHA-3 Candidates Low-cost 8-bit CPUs
2009/6/15
In this paper, we compare the implementation costs of various
SHA-3 candidates on low-cost 8-bit CPUs by estimating RAM/ROM
requirements of them. As a first step toward this kind of research, in
ou...
Trusted–HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
RFID HB+ protocol Low-cost cryptography Authentication
2009/6/2
Since the introduction at Crypto’05 by Juels and
Weis of the protocol HB+, a lightweight protocol secure against
active attacks but only in a detection based-model, many works
have tried to enhance...