搜索结果: 1-10 共查到“军事学 Driven”相关记录10条 . 查询时间(0.125 秒)
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
AES access-driven cache attacks
2017/9/21
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES...
Statistical Analysis for Access-Driven Cache Attacks Against AES
AES side-channel analysis access-driven cache attacks
2016/12/8
In recent years, side-channel timing attacks utilizing architectural
behavior have been applied to cloud settings, presenting a realistic
and serious cyber threat. Access-driven cache attacks allow ...
How to Incentivize Data-Driven Collaboration Among Competing Parties
MPC fairness timed-release crypto
2016/1/3
The availability of vast amounts of data is changing how we can make medical discoveries,
predict global market trends, save energy, and develop new educational strategies. In certain
settings such ...
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
implementation instruction-level code encryption physical unclonable function (PUF)
2015/12/29
A persistent problem with program execution, despite numerous
mitigation attempts, is its inherent vulnerability to the injection
of malicious code. Equally unsolved is the susceptibility of firmwar...
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
Anonymous credential system Fully decentralized protocol
2014/3/5
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication pr...
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Cryptographic Protocols Game Theory Secure Computation Composition
2014/3/10
Existing work on “rational cryptographic protocols” treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundam...
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
ARM Cortex-A series processors time-driven cache attacks cache-collision attacks
2013/4/18
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop computers. Recently, also investigations of such attacks on testbeds with processors that are emplo...
An Improved Trace Driven Instruction Cache Timing Attack on RSA
public-key cryptography / Instruction cache-timing attacks side channel attack RSA cryptographic algorithm Trace-driven.
2012/3/23
The previous I-cache timing attacks on RSA which exploit the instruction path of a cipher were mostly proof-of-concept, and it is harder to put them into practice than D-cache timing attacks. We propo...
Trace-Driven Cache Attacks on AES
Side-channel cryptanalysis cache attacks trace-driven attacks AES
2008/11/14
Cache based side-channel attacks have recently been attracted
significant attention due to the new developments in the field. In this
paper, we present efficient trace-driven cache attacks on a wide...
Analysis of countermeasures against access driven cache attacks on AES
cache attacks AES threat model
2008/8/14
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models for tampering or sid...