搜索结果: 1-7 共查到“军事学 32-bit”相关记录7条 . 查询时间(0.08 秒)
Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or ...
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Fault attack laser injection flash memory
2018/11/2
Physical attacks are a known threat to secure embedded systems. Notable among these is laser fault injection, which is probably the most powerful fault injection technique. Indeed, powerful injection ...
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Microcontroller Message Authentication Code Standard Model Security
2016/1/9
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm
for 32-bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot
implement stan...
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
elliptic curve cryptography Curve25519 ECDH key-exchange
2015/12/31
This paper presents new speed records for 128-bit secure elliptic-curve Diffie-Hellman key-exchange software on three different popular microcontroller architectures. We consider a 255-bit curve propo...
RC4 has remained the most popular software stream cipher since the last two decades. In parallel to cryptanalytic attempts, researchers have come up with many variants of RC4, some targeted to more se...
Cryptanalysis of a 32-bit RC4-like Stream Cipher
Cryptanalysis 32-bit RC4-like Stream Cipher keystream
2009/2/17
Nawaz, Gupta and Gong recently proposed a 32-bit RC4-like
stream cipher. In this paper, we show that the keystream generated from
their stream cipher is not random. The keystream can be distinguishe...
A 32-bit RC4-like Keystream Generator
RC4 stream ciphers random shuffle keystream generator
2009/2/11
In this paper we propose a new 32-bit RC4 like keystream
generator. The proposed generator produces 32 bits in each iteration and
can be implemented in software with reasonable memory requirements.
...