搜索结果: 1-14 共查到“军事学 Assessment”相关记录14条 . 查询时间(0.07 秒)
Neural Network Model Assessment for Side-Channel Analysis
Side-Channel Analysis Neural Networks Model Assessment
2019/6/19
Leakage assessment of cryptographic implementations with side-channel analysis relies on two important assumptions: leakage model and the number of side-channel traces. In the context of profiled side...
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
side channel leakage assessment deep learning
2019/5/21
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequent...
Side-channel attacks rely on the fact that the physical behavior of a device depends on the data it manipulates. We show in this paper how to use this class of attacks to break the security of some cr...
Assessment of the Key-Reuse Resilience of NewHope
Post-quantum cryptography lattice based cryptography active attack
2019/1/26
NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. In this p...
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Lightweight cryptography PRESENT
2018/11/5
Lightweight block ciphers are today of paramount importance to provide security services in constrained environments. Recent studies have questioned the security properties of PRESENT, which makes it ...
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
implementation side-channel attacks
2018/1/2
Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version ...
We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed techn...
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
AES Side-channel analysis
2016/1/23
A sound design time evaluation of the security of a digital device is a goal which has attracted a great amount of research effort lately. Common security metrics for the attack consider either the ...
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
side-channel analysis certification experimental cryptanalysis
2016/1/6
Rank estimation algorithms allow analyzing the computational
security of cryptographic keys for which adversaries have obtained
partial information thanks to leakage or cryptanalysis. They are parti...
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
side-channel analysis t-test leakage assessment
2016/1/3
Evoked by the increasing need to integrate side-channel countermeasures
into security-enabled commercial devices, evaluation labs
are seeking a standard approach that enables a fast, reliable and ro...
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
side-channel analysis countermeasure threshold implementation
2015/12/29
Higher-order side-channel attacks are becoming amongst the
major interests of academia as well as industry sector. It is indeed being
motivated by the development of countermeasures which can preven...
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
ECDLP Pollard rho FPGA elliptic curves
2015/12/29
Elliptic Curve Cryptography (ECC) is a popular tool to construct
public-key crypto-systems. The security of ECC is based on the
hardness of the elliptic curve discrete logarithm problem (ECDLP). Imp...
Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis
Security Assessment Hierocrypt Cryptanalysis
2009/4/16
The authors analyze the security of Hierocrypt-3(128-bit)
and Hierocrypt-L1(64-bit) designed on the nested SPN(NSPN) structure
against the differential and linear cryptanalysis, and found that they ...
A New American Way of War? C4ISR in Operation Iraqi Freedom, A Provisional Assessment
C4ISR Operation Iraqi Freedom Provisional Assessment
2009/3/10
This article uses evidence in the public domain about Operation Iraqi Freedom, as a means to assess how far American military forces are able to act on ideas about net-centric warfare, information ope...