搜索结果: 1-15 共查到“军事学 Physical”相关记录45条 . 查询时间(0.229 秒)
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
transient effect ring oscillator true random number generator physically unclonable function
2019/7/15
In an article from CHES 2015, which appears in extended form in the Journal of Cryptology in 2019, Bernard, Haddad, Fischer, and Nicolai modeled the physical behavior of a transient effect ring oscill...
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Information theoretic security key agreement physical unclonable functions
2019/7/8
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Authenticated encryption re-keying tweakable block cipher
2019/2/26
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers asymptotically optimal s...
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implemen...
Deconstructing the Blockchain to Approach Physical Limits
Blockchains physical limits deconstruction
2018/11/5
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these m...
Secure and Reliable Key Agreement with Physical Unclonable Functions
information theory physical unclonable functions transform coding
2018/5/30
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrela...
A voting scheme with post-quantum security based on physical laws
voting scheme no-key protocol post-quantum security
2018/5/22
Traditional cryptography is under huge threat along of the evolution of quantum information and computing. In this paper, we propose a new post-quantum voting scheme based on physical laws by using en...
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
secure ranging physical layer security
2017/12/25
Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation o...
In this paper, we introduce CAPA: a combined countermeasure against physical attacks. Our countermeasure provides security against higher-order SCA, multiple-shot DFA and combined attacks, scales to a...
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
side-channel attacks masking probing security proofs physical defaults
2017/7/26
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable properties for secure implementations of masking schemes. While tools exist to guarantee them separatel...
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
Physical Unclonable Functions (PUFs) Fuzzy Extractor Coding Theory
2016/12/10
Physical Unclonable Functions (PUFs) provide cryptographic keys for embedded systems without secure non-volatile key storage. Several error correction schemes for key generation with PUFs were introdu...
Physical Unclonable Functions based on Temperature Compensated Ring Oscillators
Physical unclonable function (PUF) delay-based PUF, RO-PUF
2016/12/9
Physical unclonable functions (PUFs) are promising hardware security primitives suitable for low-cost cryptographic applications.Ring oscillator (RO) PUF is a well-received silicon PUF solution due to...
Physical Layer Group Key Agreement for Automotive Controller Area Networks
Automotive security ECU keys CAN bus
2016/6/8
Distribution of cryptographic keys between devices communicating over a publicly accessible medium is an important component of secure design for networked systems. In this paper, we consider the prob...
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
Stefan Dziembowski Sebastian Faust Gottfried Herold
2016/6/6
Most leakage-resilient cryptographic constructions aim at limiting the information adversaries can obtain about secret keys. In the case of asymmetric algorithms, this is usually obtained by secret sh...
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
memory encryption side-channel attack power analysis
2016/5/18
Memory and disk encryption is a common measure to protect sensitive information in memory from adversaries with physical access. However, physical access also comes with the risk of physical attacks. ...