搜索结果: 1-4 共查到“军队指挥学 Power Analysis Attack”相关记录4条 . 查询时间(0.183 秒)
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Correlation power analysis attack Spin-transfer torque magnetic RAM MICKEY-128 2.0 stream cipher
2017/5/15
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are considered potential candidates for implementing low-power, high density storage systems. The vulnerabil...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
We describe an SPA attack on an 8-bit smart card implementation of the Serpent
block cipher. Our attack uses measurements taken during an on-the-fly key expansion
together with linearity in the ciph...
An Improved Power Analysis Attack Against Camellia's Key Schedule
Power Analysis Attack Camellia's Key Schedule
2009/3/6
This paper presents an improved simple power analysis attack against the key
schedule of Camellia. While the original attack required an exact determination of the
Hamming weight of intermediate dat...