搜索结果: 1-15 共查到“军事学 Power”相关记录133条 . 查询时间(0.178 秒)
The Power of NIST Cryptographic Statistical Tests Suite
Statistical testing Cryptographic evaluation Random bit generators
2019/8/8
This paper is focused on an open question regarding the correlation and the power of NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve the ...
This paper presents an efficient algorithm for computing 11th11th-power residue symbols in the cyclotomic field Q(ζ11)Q(ζ11), where ζ11ζ11 is a primitive 11th11th root of unity. It extends an earlier ...
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
On-Device Power Analysis Across Hardware Security Domains
side-channel power analysis cross-domain
2019/6/12
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the dev...
Identity-Based Encryption from e-th Power Residue Symbols
identity-based encryption ee-th power residue symbol the general reciprocity law on function fields
2019/5/27
This paper generalizes the notable Galbrath's test by introducing the general reciprocity law on function fields. With the help of the extended Galbrath's test, we show the scheme of Boneh, LaVigne an...
Modeling Power Efficiency of S-boxes Using Machine Learning
Power Efficiency Optimal S-box Dynamic power
2019/2/26
In the era of lightweight cryptography, designing cryptographically good and power efficient 4x4 S-boxes is a challenging problem. While the optimal cryptographic properties are easy to determine, ver...
On the (non) obfuscating power of Garside Normal Forms
group based cryptography post-quantum digital signatures conjugacy search problem
2018/11/30
Braid groups are infinite non-abelian groups naturally arising from geometric braids that have been used in cryptography for the last two decades. In braid group cryptography public braids often conta...
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
side-channel analysis FPGA
2018/11/13
The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet ext...
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Side-channel analysis Convolutional Neural Networks Machine learning
2018/11/2
Profiled side-channel attacks based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that ...
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Side-channel analysis LWE Frodo
2018/7/18
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both parameter and implementation choices on their side-channel resilience is still poorly understood. Aysu e...
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
Static Power Side-Channel Analysis - A Survey on Measurement Factors
CMOS Measurement Factors
2018/7/16
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
Special purpose factoring algorithms have discouraged the adoption of multi-power RSA, even in a post-quantum setting. We revisit the known attacks and find that a general recommendation against repea...