搜索结果: 1-10 共查到“军事学 effect”相关记录10条 . 查询时间(0.312 秒)
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Boomerang connectivity table GIFT Automatic search
2019/6/10
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
Transient Effect Ring Oscillators Leak Too
Transient effect ring oscillator electromagnetic leaks side-channel analysis
2019/3/21
Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Her...
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
ring signature anonymity privacy traceable
2018/4/20
Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques called linkable ring signature and one-t...
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Secure Enclaves Intel SGX Oblivious Data Structures
2018/3/8
Ability to query and update over encrypted data is an essential feature to enable breach-resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have demonstrated the import...
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Vehicular communications security and privacy pseudonym certificates
2018/1/29
Security and privacy are important requirements for the broad deployment of intelligent transportation systems (ITS). This motivated the development of many proposals aimed at creating a Vehicular Pub...
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
applications Physical Unclonable Functions
2015/12/29
This paper proposes a theoretical study and a full overview of the design, evaluation and optimization of a PUF based on transient element ring oscillators (TERO-PUF). We show how, by following some s...
In January 2011, Groestl team published tweaks to their specification of Groestl. In this paper, we investigate the influence of these tweaks on the Groestl performance in hardware. The results indica...
Groestl Tweaks and their Effect on FPGA Results
implementation / SHA-3 hash functions hardware FPGA
2012/3/22
In January 2011, Groestl team published tweaks to their specification of Groestl. In this paper, we investigate the influence of these tweaks on the Groestl performance in hardware. The results indica...
Groestl Tweaks and their Effect on FPGA Results
implementation / SHA-3 hash functions hardware FPGA
2012/3/21
In January 2011, Groestl team published tweaks to their specification of Groestl. In this paper, we investigate the influence of these tweaks on the Groestl performance in hardware. The results indica...
Effect of the Dependent Paths in Linear Hull
secret-key cryptography Linear Hull Dependency of Linear Paths Weak
2010/7/13
Linear Hull is a phenomenon that there are a lot of linear paths with the same data mask but different key masks for a block cipher. In 1994, Nyberg presented the effect on the key-recovery attack suc...