搜索结果: 1-4 共查到“军队指挥学 cryptographic implementations”相关记录4条 . 查询时间(0.046 秒)
Breaking Cryptographic Implementations Using Deep Learning Techniques
deep learning machine learning side channel attacks
2016/12/8
Template attack is the most common and powerful profiled side channel attack. It relies on a realistic assumption regarding the noise of the device under attack: the probability density function of th...
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
side-channel protection TI FPGA
2016/12/7
First-order secure Threshold Implementations (TI) of symmetric
cryptosystems provide provable security at a moderate overhead;
yet attacks using higher-order statistical moments are still feasible. ...
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
TLS MEE-CBC Timing attacks
2016/1/26
We provide further evidence that implementing software countermeasures against timing attacks
is a non-trivial task and requires domain-specific software development processes: we report an implement...
Fault attacks are active attacks in which an adversary with physical access to a
cryptographic device, for instance a smartcard, tampers with the execution of an algorithm to
retrieve secret materia...