搜索结果: 1-8 共查到“军事学 critical”相关记录8条 . 查询时间(0.031 秒)
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
side-channel analysis leakage detection security certification
2019/9/16
The ISO standardisation of `Testing methods for the mitigation of non-invasive attack classes against cryptographic modules' (ISO/IEC 17825:2016) specifies the use of the Test Vector Leakage Assessmen...
The End of Logic Locking? A Critical View on the Security of Logic Locking
Logic Locking Logic Encryption
2019/7/15
With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, i.e., chip manufacturing has been outsourced to foundries across the...
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
fault countermeasure infection differential fault analysis
2019/4/8
As fault based cryptanalysis is becoming more and more of a practical threat, it is imperative to make efforts to devise suitable countermeasures. In this regard, the so-called ``infective countermeas...
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Privacy-enhancing technologies private cloud services dynamic searchable symmetric encryption
2017/12/25
Searchable encryption has received a significant attention from the research community with various constructions being proposed, each achieving asymptotically optimal complexity for specific metrics ...
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
Reconfigurable LUT (RLUT) FPGA CFGLUT5,
2016/1/4
Modern FPGAs offer various new features for enhanced reconfigurability
and better performance. One of such feature is a dynamically
Reconfigurable LUT (RLUT) whose content can be updated internally,...
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
cryptocurrency blockchain mining
2015/12/18
After more than six years from the launch of Bitcoin, it has become evident
that the decentralized transaction ledger functionality implemented
through the blockchain technology can be used not only...
Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
Critical group discrete logarithm problem cryptanalysis
2009/6/3
Biggs has recently proposed the critical group of a certain class
of finite graphs as a platform group for cryptosystems relying on the
difficulty of the discrete log problem. The paper uses techniq...
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Critical Analysis AACS Drive-Host Authentication
2008/5/22
This paper presents a critical analysis of the AACS drive-host authentication scheme. A few
weaknesses are identified which could lead to various attacks on the scheme. In particular, we
observe tha...