搜索结果: 1-15 共查到“军事学 Tool”相关记录15条 . 查询时间(0.043 秒)
One approach for blockchain based applications to provide a proof-of-work is the computation of hash-values. In our opinion these computations are a waste of energy. It would be highly desirable to fi...
maskVerif: a formal tool for analyzing software and hardware masked implementations
Glitches Masking Formal verification
2018/6/5
Masking is a popular countermeasure for protecting both hardware and software implementations against differential power analysis. A main strength of software masking is that its security guarantees c...
With the BCT, previous observations on the S-box including the incompatibility, the ladder switch and the S-box switch are represented in a unified manner. Moreover, the BCT can detect a new switching...
Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation of these countermeasures is challenging. Experimental security evaluation requires special equipment,...
Indistinguishable Predicates: A New Tool for Obfuscation
program obfuscation indistinguishable/opaque predicates
2017/8/22
Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. We survey a number of methods to remove opaqu...
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
implementation hardware security verification
2017/3/6
Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. ...
In this paper, a new tool searching for impossible differentials against symmetric-key primitives is presented. Compared to the previous tools, our tool can detect any contradiction between input and ...
A Tool Kit for Partial Key Exposure Attacks on RSA
(Multi-Prime) RSA partial key exposure lattices
2016/12/7
Thus far, partial key exposure attacks on RSA have been intensively studied using lattice based Coppersmith's methods. In the context, attackers are given partial information of a secret exponent and ...
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Automatic search tool impossible differential zero-correlation linear
2016/7/13
Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two of the most useful cryptanalysis methods in the field of symmetric ciphers. Until now, there are several automat...
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Practical Alternative Government Decryption Backdoors
2016/3/7
A cryptographic contract and enforcement technology would guarantee release of a data
decryption key to an authorized party if and only if predetermined contract
requirements are satisfied. Threshol...
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
linear cryptanalysis authenticated encryption automated tools
2016/1/27
Differential and linear cryptanalysis are the general purpose
tools to analyze various cryptographic primitives. Both techniques have
in common that they rely on the existence of good differential o...
Rmind: a tool for cryptographically secure statistical analysis
Privacy statistical analysis hypothesis testing,
2016/1/8
Secure multi-party computation platforms are becoming more and more practical. This has paved the way for privacy-preserving statistical analysis using secure multi-party computation. Simple statistic...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration, and it derives formal, qua...
TASTY: Tool for Automating Secure Two-partY computations
cryptographic protocols Secure Two-partY computations
2010/7/14
In this paper we present TASTY, a novel tool for automating, i.e., describing, generating, executing, benchmarking, and comparing, efficient secure two-party computation protocols. TASTY is a new comp...
Sequences of Games:A Tool for Taming Complexity in Security Proofs
Sequences of Games Taming Complexity Security Proofs
2009/4/2
This paper is brief tutorial on a technique for structuring security proofs as sequences
games.