搜索结果: 1-15 共查到“军事学 Modeling”相关记录29条 . 查询时间(0.053 秒)
Modeling Memory Faults in Signature and Encryption Schemes
fault attacks security model fault resilience deterministic signatures
2019/9/19
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
EMV Universal Composability Security Models
2019/8/19
EMV, also known as Chip and PIN, is the world-wide standard for card-based electronic payment. Its security wavers: over the past years, researchers have demonstrated various practical attacks, rangin...
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Side-channel analysis location leakage microprobe
2019/3/4
Near-field microprobes have the capability to isolate small regions of a chip surface and enable precise measurements with high spatial resolution. Being able to distinguish the activity of small regi...
Modeling Power Efficiency of S-boxes Using Machine Learning
Power Efficiency Optimal S-box Dynamic power
2019/2/26
In the era of lightweight cryptography, designing cryptographically good and power efficient 4x4 S-boxes is a challenging problem. While the optimal cryptographic properties are easy to determine, ver...
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
formal verification noise protocol framework cryptographic protocols
2018/8/21
The Noise Protocol Framework, introduced recently, allows for the design and construction of secure channel protocols by describing them through a simple, restricted language from which complex key de...
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Side-channel analysis belief propagation random probing model
2018/5/28
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security...
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Post-quantum cryptography isogeny-based cryptography authenticated key establishment
2018/3/26
We propose a security model for authenticated key establishment in the quantum setting. Our model is the first for authenticated key establishment that allows for quantum superpositions of queries. Th...
The Transaction Graph for Modeling Blockchain Semantics
Blockchain Ethereum Distributed ledgers
2017/11/13
The advent of Bitcoin paved the way for a plethora of blockchain systems supporting diverse applications beyond cryptocurrencies. Although in-depth studies of the protocols, security, and privacy of b...
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
Keccak SHA-3 KMAC
2017/10/30
In this paper, we provide a new MILP modeling to find better/optimal choices of conditional cubes. These choices generally find new or improved attacks against the keyed constructions based on Keccak ...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
Arbiter physically unclonable function (APUF) modeling attack, propagation criterion reliability based modeling
2017/6/15
Silicon Physical Unclonable Functions (PUFs) have been proposed as an emerging hardware security primitive in various security applications such as device identification, authentication, and cryptogra...
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Moving Target Defense Security Capacity Markov Models
2016/12/12
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probabil...
In recent work, Bellare, Hoang, and Keelveedhi (CRYPTO 2013) introduced a new abstraction called Universal Computational Extractors (UCEs), and showed how they can replace random oracles (ROs) across ...
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function
Cryptanalysis hardware--intrinsic security lightweight secure PUFs
2016/5/3
The Lightweight Secure Physically Unclonable Function (LSPUF) was proposed as a secure composition of Arbiter PUFs
with additional XOR based input and output networks. But later, researchers proposed...
A Physical Approach for Stochastic Modeling of TERO-based TRNG
hardware random number generators transition effect ring oscillator
2015/12/29
Security in random number generation for cryptography is closely related
to the entropy rate at the generator output. This rate has to be evaluated
using an appropriate stochastic model. The stochas...