搜索结果: 1-10 共查到“军事学 high-order”相关记录10条 . 查询时间(0.125 秒)
Improved High-Order Conversion From Boolean to Arithmetic Masking
Side-channel countermeasure high-order masking Boolean to arithmetic conversion
2018/4/10
Masking is a very common countermeasure against side channel attacks. When combining Boolean and arithmetic masking, one must be able to convert between the two types of masking, and the conversion al...
Very High Order Masking: Efficient Implementation and Security Evaluation
masking block ciphers, performances security evaluations
2017/7/4
In this paper, we study the performances and security of recent masking algorithms specialized to parallel implementations in a 32-bit embedded software platform, for the standard AES Rijndael and the...
High Order Masking of Look-up Tables with Common Shares
Side-channel countermeasure ISW probing model
2017/3/27
Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, b...
High-Order Conversion From Boolean to Arithmetic Masking
Side-channel attacks and countermeasures boolean and arithmetic masking ISW probing model
2017/3/21
Masking with random values is an effective countermeasure against side-channel attacks. For cryptographic algorithms combining arithmetic and Boolean masking, it is necessary to switch from arithmetic...
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
RSA CRT fault injection
2016/1/8
In this paper we study the existing CRT-RSA countermeasures against fault-injection attacks.
In an attempt to classify them we get to achieve deep understanding of how they work.
We show that the ma...
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Multi-Variate High-Order Attacks Tables Recomputation
2015/12/23
Masking schemes based on tables recomputation are classical
countermeasures against high-order side-channel attacks. Still, they
are known to be attackable at order d in the case the masking involve...
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency
implementation / High-Order Masking High-Order Correlation Power Analysis (HO-CPA) High-Order CPA Immunity ($\mathsf{HCI}$) Mutual Information Metric (MIM)
2012/3/26
This article provides an in-depth study of high-order (HO) Boolean masking countermeasure against side-channel attacks. We introduce the notion of HO-CPA immunity as a metric to characterize a leakage...
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
multivariate public key cryptosystem quadratic polynomial algebraic cryptanalysis
2008/12/22
In the CT-track of the 2006 RSA conference, a new multivariate
public key cryptosystem, which is called the Medium Field Equation
(MFE) multivariate public key cryptosystem, is proposed by Wang,
Ya...
Inferring sequences produced by a linear congruential generator on elliptic curves missing high–order bits
Pseudorandom congruential generators Lattice reduction Elliptic curves
2008/9/9
Let p be a prime and let E(IFp) be an elliptic curve defined
over the finite field IFp of p elements.
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Quantum Uncertainty Relation Applications
2008/5/29
We derive a new entropic quantum uncertainty relation involving min-entropy. The
relation is tight and can be applied in various quantum-cryptographic settings.