搜索结果: 1-15 共查到“军事学 Survey”相关记录32条 . 查询时间(0.164 秒)
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Authenticated encryption hardware performance authenticated encryption mode
2019/6/24
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel wit...
In the past 15 years, cryptography has made considerable progress in expanding the adversarial attack model to cover side-channel attacks, and has built schemes to provably defend against some of them...
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Internet of Things Elliptic curve cryptosystems Side-channel attack
2019/1/9
The main objective of the Internet of Things is to interconnect everything around us to obtain information which was unavailable to us before, thus enabling us to make better decisions. This interconn...
A verifiable delay function (VDF) is an important tool used for adding delay in decentralized applications. This short note briefly surveys and compares two recent beautiful Verifiable Delay Functions...
Static Power Side-Channel Analysis - A Survey on Measurement Factors
CMOS Measurement Factors
2018/7/16
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...
A Survey and Refinement of Repairable Threshold Schemes
threshold schemes repairability combinatorial designs
2017/11/29
We consider repairable threshold schemes (RTSs), which are threshold schemes that enable a player to securely reconstruct a lost share with help from their peers. We summarise and, where possible, ref...
Survey of Approaches for Security Verification of Hardware/Software Systems
formal methods theorem provers model checkers
2016/12/10
Variety of computing systems have been proposed to provide protection for sensitive code or data through hardware or software mechanisms. This paper surveys the landscape of security verification appr...
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring a...
A survey of attacks on Ethereum smart contracts
smart contracts blockchain cryptocurrencies
2016/12/8
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and tra...
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size ...
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Microarchitectural timing attacks Cache-based timing attacks Countermeasures
2016/6/17
Microarchitectural timing channels expose hidden hardware state though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for...
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
Processor Architectures Side-channels Covert-channels
2016/5/24
Over last two decades, side and covert channel research has shown variety of ways of exfiltrating information for a computer system. Processor microarchitectural side and covert channel attacks have e...
I survey some of the recent progress on software obfuscation spurred by the exciting paper of Garg, Gentry, Halevi, Raykova, Sahai and Waters (FOCS 2013). This is a preprint version of a review articl...
Nowadays there are different types of attacks in block and stream ciphers. In
this work we will present some of the most used attacks on stream ciphers. We
will present the newest techniques with an...
A survey of Fault Attacks in Pairing Based Cryptography
Pairing based cryptography Miller’s algorithm fault attacks
2016/1/7
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography.
These make the use of pairings suitable for small and constrained devices (smart phones, smart
cards. ....