搜索结果: 1-15 共查到“军事学 methodology”相关记录15条 . 查询时间(0.044 秒)
Methodology for Efficient CNN Architectures in Profiling Attacks
Side-Channel Attacks Deep Learning Architecture
2019/7/15
The side-channel community has recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems. Previous works have shown the benefit o...
State-Separating Proofs: A Reduction Methodology for Real-World Protocols
composition verification key exchange
2018/4/4
The security analysis of real-world protocols involves reduction steps that are conceptually simple but have to handle complicated protocol details. Taking inspiration from Universal Composability, Ab...
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
SSL/TLS reproducible analysis
2017/2/20
Over the years, SSL/TLS has become an essential part of Internet security. As such, it should offer robust and state-of-the-art security, in particular for HTTPS, its first application. Theoretically,...
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate
NICV SNR Success Rate
2016/12/24
Evaluation of side channel vulnerability of a cryptosystem has seen significant advancement in recent years. Researchers have proposed several metrics like Test Vector Leakage Assessment Methodology (...
A Methodology for the Characterisation of Leakages in Combinatorial Logic
side-channel analysis hardware countermeasures glitches
2016/12/10
Glitches represent a great danger for hardware implementations of cryptographic schemes. Their intrinsic random nature makes them difficult to tackle and their occurrence threatens side-channel protec...
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
Stealthy Parametric Trojans Bug Attacks
2016/6/8
Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how h...
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
security trust standardised side-channel measurement
2016/5/30
Testing of electronic components is indispensable to minimize malfunction
and failure of complex electronic systems. Currently, functionality and performance of
these electronic components are the m...
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
group signature revocation scalability
2016/5/20
In EUROCRYPT 2012, Libert, Peters and Yung (LPY) proposed the first scalable revocable group signature (R-GS) scheme in the standard model which achieves constant signing/verification costs and other ...
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
AES implementation smart cards
2016/1/8
This paper presents a standard-cell-based semi-automatic
design methodology of a new conceptual countermeasure against electromagnetic
(EM) analysis and fault-injection attacks. The countermeasure
...
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
side-channel analysis t-test leakage assessment
2016/1/3
Evoked by the increasing need to integrate side-channel countermeasures
into security-enabled commercial devices, evaluation labs
are seeking a standard approach that enables a fast, reliable and ro...
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family
Physically Unclonable Function Arbiter PUF Photonic emission analysis
2015/12/23
As intended by its name, Physically Unclonable Functions
(PUFs) are considered as an ultimate solution to deal with insecure storage,
hardware counterfeiting, and many other security problems. Howev...
The Random Oracle Methodology, Revisited
Correlation Intractability Random Oracle Methodology
2009/4/17
We take a critical look at the relationship between the security of cryptographic schemes in
the Random Oracle Model, and the security of the schemes that result from implementing the
random oracle ...
Indifferentiability, Impossibility Results on Reductions,and Applications to the Random Oracle Methodology
Indistinguishability reductions indifferentiability
2009/4/9
The goals of this paper are three-fold. First we introduce and motivate a generalization
of the fundamental concept of the indistinguishability of two systems, called indifferentiability. This
immed...
On the random-oracle methodology as applied to length-restricted signature schemes
Signature Schemes The Random Oracle Model Interactive Proof systems
2009/4/9
In earlier work, we described a “pathological” example of a signature scheme that is secure
in the Random Oracle Model, but for which no secure implementation exists. For that example,
however, it w...
On the complexity of side-channel attacks on AES-256 methodology and quantitative results on cache attacks -
side-channel cache attacks AES-192 AES-256 symmetric key cipher
2008/5/30
Larger key lengths translate into an exponential increase in the complexity of an exhaustive search. Side-channel attacks, however, use a divide-and-conquer approach and hence it is generally assumed ...