搜索结果: 1-3 共查到“军事学 cryptographic devices”相关记录3条 . 查询时间(0.062 秒)
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
field multiplication individualizing electrical circuit of multiplier power traces
2015/12/30
Side channel and fault attacks take advantage from the fact that the
behavior of crypto implementations can be observed and provides hints that
simplify revealing keys. In a real word a lot of devic...
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
DPA attacks CMOS cryptographic devices leakage behavior
2008/11/26
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior.