咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 8 篇 网络空间安全
    • 5 篇 计算机科学与技术...
    • 2 篇 电子科学与技术(可...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 11 篇 side-channel att...
  • 2 篇 elliptic curve c...
  • 2 篇 post-quantum cry...
  • 2 篇 resists
  • 1 篇 cpu vulnerabilit...
  • 1 篇 logic gates
  • 1 篇 dpa
  • 1 篇 iot
  • 1 篇 nist
  • 1 篇 cache
  • 1 篇 nist lightweight...
  • 1 篇 physical unclona...
  • 1 篇 interesting poin...
  • 1 篇 costs
  • 1 篇 ecc
  • 1 篇 hardware securit...
  • 1 篇 power analysis a...
  • 1 篇 template attacks
  • 1 篇 performance eval...
  • 1 篇 scalar multiplic...

机构

  • 2 篇 school of cyber ...
  • 1 篇 institute of inf...
  • 1 篇 guangdong key la...
  • 1 篇 school of cyber ...
  • 1 篇 department of so...
  • 1 篇 simulation cente...
  • 1 篇 university of ch...
  • 1 篇 school of inform...
  • 1 篇 state key labora...
  • 1 篇 xidian universit...
  • 1 篇 institution of m...
  • 1 篇 key laboratory o...
  • 1 篇 electric power r...
  • 1 篇 it engineering d...
  • 1 篇 trusted computin...
  • 1 篇 college of compu...
  • 1 篇 mathematics depa...
  • 1 篇 state key labora...
  • 1 篇 state key labora...
  • 1 篇 department of en...

作者

  • 2 篇 yongbin zhou
  • 1 篇 li qingwen
  • 1 篇 ibrahima gueye
  • 1 篇 md. selim hossai...
  • 1 篇 dai shuguang
  • 1 篇 kuang xiaoyun
  • 1 篇 kaiyan chen
  • 1 篇 pierre-louis cay...
  • 1 篇 chen hua
  • 1 篇 yang yiwei
  • 1 篇 idy diop
  • 1 篇 zhou yongbin
  • 1 篇 zhang fangguo
  • 1 篇 hu yupu
  • 1 篇 yao lu
  • 1 篇 boly seck
  • 1 篇 wang yuan
  • 1 篇 jingdian ming
  • 1 篇 zhang hailong
  • 1 篇 demba faye

语言

  • 10 篇 英文
  • 1 篇 中文
检索条件"主题词=Side-channel attacks"
11 条 记 录,以下是1-10 订阅
排序:
side-channel attacks and learning-vector quantization
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2017年 第4期18卷 511-518页
作者: Ehsan SAEEDI Yinan KONG Md. Selim HOSSAIN Department of Engineering Macquarie University Sydney Australia
The security of cryptographic systems is a major concern for cryptosystem designers, even though cryptography algorithms have been improved. side-channel attacks, by taking advantage of physical vulnerabilities of cry... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Method against side-channel attacks on ECC
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1573-1576页
作者: LIU Shuanggen HU Yupu XU Wensheng Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 Jiangxi China
side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dual-Voltage Single-Rail Dynamic DPA-Resistant Logic Based on Charge Sharing Mechanism
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 899-904页
作者: TANG Wenyi JIA Song WANG Yuan Institution of Microelectronics Peking University
Differential power analysis(DPA) has become a ma jor system security *** achieve high levels of security with low power and die area costs,a novel Dual-voltage single-rail dynamic logic(DSDL) design is *** proposed sc... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Memory leakage-resilient secret sharing schemes
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 191-199页
作者: DAI ShuGuang WEI JinFeng ZHANG FangGuo School of Information Science and Technology Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Mathematics Department College of Arts and Sciences Maryville University of St.Louis
A secret sharing scheme is a method to share secrets among some shareholders such that the shared secrets can be recovered only by certain authorized sets, not by the unauthorized sets. However, in practice,attackers ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The Cognition Is Not Enough:Another Look on Existing Interesting Points Chosen Methods
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 416-423页
作者: FAN Guangjun ZHOU Yongbin ZHANG Hailong FENG Dengguo State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
For classical template attacks,many papers suggested a guideline of choosing interesting points which is still not *** to now,many different methods of choosing interesting points were ***,it is still unclear that whi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Transparency order versus confusion coefficient:a case study of NIST lightweight cryptography S‑Boxes
收藏 引用
Cybersecurity 2021年 第1期4卷 541-560页
作者: Huizhong Li Guang Yang Jingdian Ming Yongbin Zhou Chengbin Jin Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China School of Cyber Security Nanjing University of Science and TechnologyNanjing 210094China Department of Software Engineering and Software Evaluation Beijing Institute of Computer Technology and ApplicationBeijing 100039China
side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic *** most cases,non-linear components(e.g.S-Boxes)of cryptographic algorithms will be ch... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Combined Countermeasure Against side-channel and Fault Attack with Threshold Implementation Technique
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 199-208页
作者: JIAO Zhipeng CHEN Hua FENG Jingyi KUANG Xiaoyun YANG Yiwei LI Haoyuan FAN Limin Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences University of Chinese Academy of Sciences Electric Power Research Institute China Southern Power Grid
side-channel attack(SCA) and fault attack(FA) are two classical physical attacks against cryptographic implementation. In order to resist them, we present a combined countermeasure scheme which can resist both SCA and... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Time-Area-Efficient and Compact ECSM Processor over GF(p)
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1355-1366页
作者: HE Shiyang LI Hui LI Qingwen LI Fenghua Xidian University Chinese Academy of Sciences
The elliptic curve scalar multiplication(ECSM) is the core of elliptic curve cryptography(ECC),which directly determines the performance of ECC. In this paper, a novel time-area-efficient and compact design of a 256-b... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on Microarchitectural Cache attacks
Research on Microarchitectural Cache Attacks
收藏 引用
作者: Yao Lu Kaiyan Chen Yinlong Wang Simulation Center of Ordnance Engineering College Army Engineering University
This paper summarizes the basic concepts and development process of cache sidechannel attack,analyses three basic methods(Evict and Time,Prime and Probe,Flush and Reload) from four aspects:Attack conditions,realizat... 详细信息
来源: cnki会议 评论
(Full) Leakage resilience of Fiat-Shamir signatures over lattices
收藏 引用
Frontiers of Computer Science 2022年 第5期16卷 181-191页
作者: Yuejun LIU Yongbin ZHOU Rui ZHANG Yang TAO State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China
Fiat-Shamir is a mainstream construction paradigm of lattice-based signature *** its theoretical security is well-studied,its implementation security in the presence of leakage is a relatively under-explored ***,even ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论