搜索结果: 1-5 共查到“军事学 radio”相关记录5条 . 查询时间(0.375 秒)
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
side channell electromagnetic analysis RSA
2016/1/3
We present new side-channel attacks on RSA and ElGamal implementations that use the
popular sliding-window or fixed-window (m-ary) modular exponentiation algorithms. The attacks
can extract decrypti...
Secure EPC Gen2 compliant Radio Frequency Identification
EPCGen2 compliance security identification
2009/6/12
The increased functionality of EPC Class1 Gen2 (EPCGen2)
is making this standard a de facto specification for inexpensive tags in
the RFID industry. Recently three EPCGen2 compliant protocols that
...
Adversarial Model for Radio Frequency Identification
RFID Adversarial Model Privacy Untraceability
2009/1/16
Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual contact. They consist of transponders inserted into objects, of readers, and...
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Secure Positioning Mobile Terminals Simplex Radio Communication
2008/12/12
With the rapid spread of various mobile terminals
in our society, the importance of secure position-
ing is growing for wireless networks in adversarial
settings. Recently, several authors have pro...
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Secure Positioning Mobile Terminals Simplex Radio Communication
2008/12/11
With the rapid spread of various mobile terminals
in our society, the importance of secure position-
ing is growing for wireless networks in adversarial
settings. Recently, several authors have pro...