搜索结果: 1-15 共查到“军事学 devices”相关记录57条 . 查询时间(0.718 秒)
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
Towards Optimized and Constant-Time CSIDH on Embedded Devices
commutative supersingular isogeny constant-time embedded devices
2019/3/21
We present an optimized, constant-time software library for commutative supersingular isogeny Diffie-Hellman key exchange (CSIDH) proposed by Castryck et al. which targets 64-bit ARM processors. The p...
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
Post-quantum cryptography supersingular isogeny SIDH
2018/11/8
The quantum secure supersingular isogeny Diffie-Hellman (SIDH) key exchange is a promising candidate in NIST's on-going post-quantum standardization process. The evaluation of various implementation c...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
public-key cryptography Embedded Devices
2018/9/6
We show how to implement the Montgomery reduction algorithm for isogeny based cryptography such that it can utilize the "unsigned multiply accumulate accumulate long" instruction present on modern ARM...
Standard Lattice-Based Key Encapsulation on Embedded Devices
Post-quantum cryptography standard lattices Frodo
2018/7/18
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al. proposed the key exchange...
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Power analysis SW-CPA Jittered clocks
2018/4/9
Power analysis side channel attacks rely on aligned traces. As a counter-measure, devices can use a jittered clock to misalign the power traces. In this paper we suggest a way to overcome this counter...
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of prot...
Secure Code Updates for Smart Embedded Devices based on PUFs
Secure Code Update PUF Remote Attestation
2017/10/12
Code update is a very useful tool commonly used in low-end embedded devices to improve the existing functionalities or patch discovered bugs or vulnerabilities. If the update protocol itself is not se...
FourQ on embedded devices with strong countermeasures against side-channel attacks
Elliptic curves FourQ ECDH
2017/5/23
This work deals with the energy-efficient, high-speed and high-security implementation of elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and elliptic curve dig...
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring a...
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2016/12/8
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underlying k...
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
side channel attack cache TrustZone
2016/12/8
As smart, embedded devices are increasingly integrated into our daily life, the security of these devices has become a major concern. The ARM processor family, which powers more than 60% of embedded d...
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Arithmetic to Boolean masking Kogge-Stone carry look-ahead adder ARX-based cryptographic algorithm
2016/7/4
A common technique employed for preventing a side channel analysis is boolean masking. However, the application of this scheme is not so straightforward when it comes to block ciphers based on Additio...
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)
E-Payment Privacy Mobile Devices TrustZone
2016/5/23
Electronic payment (e-payment) has been widely applied to electronic commerce and has especially attracted a large number of mobile users. However, current solutions often focus on protecting users' m...