搜索结果: 1-15 共查到“军事学 Testing”相关记录28条 . 查询时间(0.109 秒)
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
side-channel analysis leakage detection security certification
2019/9/16
The ISO standardisation of `Testing methods for the mitigation of non-invasive attack classes against cryptographic modules' (ISO/IEC 17825:2016) specifies the use of the Test Vector Leakage Assessmen...
This paper presents pqm4 – a testing and benchmarking framework for the ARM Cortex-M4. It makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash ROM. It currently inclu...
Efficient Message Authentication Codes with Combinatorial Group Testing
Message authentication code Combinatorial group testing Data corruption
2019/4/23
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can ...
Triggerflow: Regression Testing by Advanced Execution Path Inspection
software testing regression testing continuous integration
2019/4/11
Cryptographic libraries often feature multiple implementations of primitives to meet both the security needs of handling private information and the performance requirements of modern services when th...
Testing the Randomness of Cryptographic Function Mappings
Statistical tests Bayesian model selection AES block cipher
2019/1/29
A cryptographic function with a fixed-length output, such as a block cipher, hash function, or message authentication code (MAC), should behave as a random mapping. The mapping's randomness can be eva...
Two Party Distribution Testing: Communication and Security
foundations secure computation distribution testing
2018/11/12
We study the problem of discrete distribution testing in the two-party setting. For example, in the standard closeness testing problem, Alice and Bob each have tt samples from, respectively, distribut...
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Primality testing Miller-Rabin test Lucas test
2018/8/20
This work provides a systematic analysis of primality testing under adversarial conditions, where the numbers being tested for primality are not generated randomly, but instead provided by a possibly ...
Non-adaptive Group-Testing Aggregate MAC Scheme
message authentication aggregate group testing
2018/5/22
This paper applies non-adaptive group testing to aggregate message authentication code (MAC) and introduces non-adaptive group-testing aggregate MAC. After formalization of its syntax and security req...
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
genomic privacy privacy-preserving technologies homomorphic encryption
2017/8/16
Over the past few years, the increased affordability of genome sequencing and the ensuing availability of genetic data have propelled important progress in precision medicine and enabled a market for ...
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
Post-quantum cryptography lattice-based cryptography discrete Gaussian samplers
2017/5/23
Lattice-based cryptography is one of the most promising areas within post-quantum cryptography, and offers versatile, efficient, and high performance security services. The aim of this paper is to ver...
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate
NICV SNR Success Rate
2016/12/24
Evaluation of side channel vulnerability of a cryptosystem has seen significant advancement in recent years. Researchers have proposed several metrics like Test Vector Leakage Assessment Methodology (...
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
hardware trojan horses secure multiparty computations
2016/12/8
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from rea...
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
security trust standardised side-channel measurement
2016/5/30
Testing of electronic components is indispensable to minimize malfunction
and failure of complex electronic systems. Currently, functionality and performance of
these electronic components are the m...
An Empirical Study towards Refining the AKS Primality Testing Algorithm
AKS primality testing
2016/4/12
The AKS (Agrawal-Kayal-Saxena) algorithm is the first ever deterministic polynomial-time primality-proving algorithm whose asymptotic run time complexity is O(log12+ϵn), where ϵ>0. Despite...
This article presents a secure mutual testing strategy for System-on-Chips (SoCs) that implement cryptographic
functionalities. Such approach eliminates the need for an additional trusted component t...