搜索结果: 1-5 共查到“军事学 Mapping”相关记录5条 . 查询时间(0.14 秒)
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Higher-Order Alphabet PUFs Error-Correcting Codes
2017/9/25
Device-specific physical characteristics provide the foundation for PUFs, a hardware primitive for secure storage of cryptographic keys. So far, they have been implemented by either directly evaluatin...
Modern Intel processors use an undisclosed hash function to map memory lines into last-level cache
slices. In this work we develop a technique for reverse-engineering the hash function. We apply the ...
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
cryptographic protocols / public-key cryptography, password-based key exchange
2012/3/29
We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S\'ecurit\'e. PACE v2 IM enjoys the...
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
public-key cryptography password-based key exchange
2011/2/23
We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S\'ecurit\'e. PACE v2 IM enjoys the...
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Simulatability Soundness Mapping Soundness Symbolic Cryptography
2008/8/21
The abstraction of cryptographic operations by term algebras, called Dolev-Yao
models or symbolic cryptography, is essential in almost all tool-supported methods for proving
security protocols.