>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 faults相关记录73条 . 查询时间(0.053 秒)
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
Physical attacks are a known threat to secure embedded systems. Notable among these is laser fault injection, which is probably the most powerful fault injection technique. Indeed, powerful injection ...
Characterization of the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the...
Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault i...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and advisory bodies have started recommending that we prepare the transition away from factoring and discrete ...
RSA朇RT is the most widely used implementation for RSA signatures. However, deterministic and many probabilistic RSA signatures based on CRT are vulnerable to fault attacks. Nevertheless, Coron and M...
The calculation of the Tate pairing on ordinary curves involves two major steps: the Miller Loop (ML) followed by the Final Exponentiation (FE). The first step for achieving a full pairing inversion w...
In order to deal with the geological faults, a new algorithm of constrained Delaunay triangulation is proposed. The algorithm builds a generic Delaunay TIN from scatter points firstly. After defining ...
Numerous newly-identified traces of active faults in the Himalayan foothill zone along the HFF around Chandigarh, in Pinjore Dun, along the piedmont zone of the Lower Siwalik hill front and within the...
We acquired high-resolution seismic reflection profiles and continuously cored boreholes to evaluate active flexures produced by major blind thrust fault systems within two densely populated Neogene-Q...
Paleoseismological analyses were performed along the Campo Imperatore Fault (part of the Gran Sasso Range Fault System) in order to define the seismogenic behaviour (recurrence interval for surface fa...
Paleoseismological analyses have been performed in the Central Apennines along faults showing geomorphological evidence of Late Quaternary activity and characterised by the absence of historical seism...
We investigate the effects of non-uniform distribution of constitutive parameters on the dynamic propagation of an earthquake rupture. We use a 2D finite difference numerical method and we assume tha...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...