搜索结果: 1-15 共查到“知识库 faults”相关记录73条 . 查询时间(0.053 秒)
Modeling Memory Faults in Signature and Encryption Schemes
fault attacks security model fault resilience deterministic signatures
2019/9/19
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Fault attack laser injection flash memory
2018/11/2
Physical attacks are a known threat to secure embedded systems. Notable among these is laser fault injection, which is probably the most powerful fault injection technique. Indeed, powerful injection ...
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Security Block Cipher Fault Attack
2017/10/16
Characterization of the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the...
Loop-abort faults on supersingular isogeny cryptosystems
Supersingular isogeny cryptosystem fault injection real-world attacks
2017/5/2
Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault i...
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash’n Sign signatures
Fault Attacks Digital Signatures Postquantum Cryptography
2016/5/9
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and advisory bodies have started recommending that we prepare the transition away from factoring and discrete ...
RSA朇RT is the most widely used implementation for RSA signatures. However, deterministic and many probabilistic RSA signatures based on CRT are vulnerable to fault attacks. Nevertheless, Coron and M...
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
Tate pairing Ate pairing final exponentiation
2016/1/4
The calculation of the Tate pairing on ordinary curves involves two major steps: the Miller Loop (ML) followed by the Final Exponentiation (FE). The first step for achieving a full pairing inversion w...
Automatic Generation Triangulated Surfaces with Normal Faults and Reverse Faults
GIS Triangulation Visualization Model Reconstruction Algorithms Experiment
2015/12/3
In order to deal with the geological faults, a new algorithm of constrained Delaunay triangulation is proposed. The algorithm builds a generic Delaunay TIN from scatter points firstly. After defining ...
Active faults and related Late Quaternary deformation along the Northwestern Himalayan Frontal Zone,India
active faults Northwestern Himalayan Front paleoearthquake thrust and right lateralstrike-slip faults slip-partitioning
2015/9/16
Numerous newly-identified traces of active faults in the Himalayan foothill zone along the HFF around Chandigarh, in Pinjore Dun, along the piedmont zone of the Lower Siwalik hill front and within the...
Study of blind thrust faults underlying Tokyo and Osaka urban areas using a combination of high-resolution seismic reflection profiling and continuous coring
blind thrust fault-related fold flexure high-resolution seismic reflection profiling continuou scoring
2015/9/16
We acquired high-resolution seismic reflection profiles and continuously cored boreholes to evaluate active flexures produced by major blind thrust fault systems within two densely populated Neogene-Q...
Paleoseismology of silent faults in the Central Apennines (Italy):the Campo Imperatore Fault (Gran Sasso Range Fault System)
paleoseismology active fault Holocene Central Italy
2015/9/16
Paleoseismological analyses were performed along the Campo Imperatore Fault (part of the Gran Sasso Range Fault System) in order to define the seismogenic behaviour (recurrence interval for surface fa...
Paleoseismology of silent faults in the Central Apennines (Italy):the Mt.Vettore and Laga Mts.Faults
paleoseismology active fault Holocene Central Italy
2015/9/16
Paleoseismological analyses have been performed in the Central Apennines along faults showing geomorphological evidence of Late Quaternary activity and characterised by the absence of historical seism...
Modeling the dynamic rupture propagation on heterogeneous faults with rate- and state-dependent friction
dynamic rupture fault constitutive law fault friction stress heterogeneities
2015/9/10
We investigate the effects of non-uniform distribution of constitutive parameters on the dynamic propagation of
an earthquake rupture. We use a 2D finite difference numerical method and we assume tha...