搜索结果: 1-15 共查到“Faults”相关记录80条 . 查询时间(0.078 秒)
Modeling Memory Faults in Signature and Encryption Schemes
fault attacks security model fault resilience deterministic signatures
2019/9/19
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Fault attack laser injection flash memory
2018/11/2
Physical attacks are a known threat to secure embedded systems. Notable among these is laser fault injection, which is probably the most powerful fault injection technique. Indeed, powerful injection ...
2017年初始故障建模,检测和估计的统计信号处理方法专题会议(Special Session on Modelling,Detection and Estimation of Incipient faults using statistical-based signal processing methods)
2017年 故障建模 检测 估计 统计信号处理方法 专题会议
2017/10/24
Within the health-monitoring frame, fault diagnosis includes the following steps: modelling, detection, isolation andestimation. Quantitative-based methods have been successfully used so far in divers...
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Security Block Cipher Fault Attack
2017/10/16
Characterization of the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the...
2017地震科学前沿国际研讨会(Workshop:Frontiers in Studies of Earthquakes and Faults)
2017 地震科学 前沿国际研讨会
2017/7/18
“Workshop: Frontiers in Studies of Earthquakes and Faults”是由南方科技大学地球与空间科学系举办的一次国际前沿研讨会。该研讨会旨在促进防震减灾及地球科学研究的发展,也为科研学者,科学家等提供分享研究成果的平台,促进国际合作交流。
Seasonal rain and snow trigger small quakes on California faults(图)
Seasonal rain snow small quakes California faults
2017/7/21
California’s winter rains and snow depress the Sierra Nevada and Coast Ranges, which then rebound during the summer, changing the stress on the state’s earthquake faults and causing seasonal upticks i...
Loop-abort faults on supersingular isogeny cryptosystems
Supersingular isogeny cryptosystem fault injection real-world attacks
2017/5/2
Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault i...
Earthquakes Can Make Thrust Faults Open Violently and Snap Shut
Earthquakes Faults Open Violently Snap Shut
2017/7/19
It is a common trope in disaster movies: an earthquake strikes, causing the ground to rip open and swallow people and cars whole. The gaping earth might make for cinematic drama, but earthquake scient...
Founded by Professor T. Yokobori in 1965, the International Congress on Fracture - The World Academy on Structural Integrity (ICF-WASI) is today the premier international body for promoting worldwide ...
Study Finds Earthquakes Can Trigger Near-Instantaneous Aftershocks on Different Faults
Earthquakes Trigger Near Aftershocks Different Faults
2016/9/29
According to a new study by scientists at Scripps Institution of Oceanography at the University of California San Diego, a large earthquake on one fault can trigger large aftershocks on separate fault...
Fractures, Folds, and Faults in Thrusted Terrains: Sawtooth Range, Montana
fractures structure
2016/7/28
Exploration and development geologists, geophysicists, log analysts, engineers, and managers working in structural geology and/or fractures who want a thorough understanding of the geology and geophys...
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash’n Sign signatures
Fault Attacks Digital Signatures Postquantum Cryptography
2016/5/9
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and advisory bodies have started recommending that we prepare the transition away from factoring and discrete ...
RSA朇RT is the most widely used implementation for RSA signatures. However, deterministic and many probabilistic RSA signatures based on CRT are vulnerable to fault attacks. Nevertheless, Coron and M...