搜索结果: 1-6 共查到“军事学 Low energy”相关记录6条 . 查询时间(0.038 秒)
The specification of Bluetooth and Bluetooth Low Energy includes dedicated encryption key negotiation protocols used by two parties to agree on the entropy of encryption keys. In this work, we show th...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones
implementation public-key cryptography lightweight cryptography
2017/10/30
Aerial drones are becoming an integral part of application domains such as package delivery, construction, monitoring and search/rescue operations. It is critical to ensure the cyber-security of netwo...
Midori: A Block Cipher for Low Energy (Extended Version)
AES lightweight block cipher low energy circuits
2015/12/21
In the past few years, lightweight cryptography has become
a popular research discipline with a number of ciphers and hash functions
proposed. The designers’ focus has been predominantly to minimize...
Bypassing Passkey Authentication in Bluetooth Low Energy
cryptographic protocols Bluetooth Low Energy Authentication
2014/3/12
This memo describes new cryptographic weakness of the passkey-based pairing of Bluetooth Low Energy (also known as Bluetooth Smart). The vulnerability discussed here extends the set of possible attack...
Secure Adiabatic Logic:a Low-Energy DPA-Resistant Logic Style
Secure Adiabatic Logic Low-Energy DPA-Resistant DPA
2009/6/3
The charge recovery logic families have been designed several
years ago not in order to eliminate the side-channel leakage but
to reduce the power consumption. However, in this article we present a
...