搜索结果: 1-6 共查到“军事学 influence”相关记录6条 . 查询时间(0.171 秒)
On the Influence of Message Length in PMAC's Security Bounds
unforgeability integrity verification
2016/2/24
Many MAC (Message Authentication Code) algorithms have
security bounds which degrade linearly with the message length. Often
there are attacks that confirm the linear dependence on the message
leng...
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Boolean functions Fourier and Walsh-Hadamard transforms entropy
2016/1/26
We consider the Fourier Entropy-Influence (FEI) conjecture in
the context of cryptographic Boolean functions. We show that the FEI conjecture
is true for the functions satisfying the strict avalanch...
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
cryptographic hardware architectures security processors countermeasures against side-channel attacks
2016/1/5
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks use identical devi...
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
countermeasures against side-channel attacks FPGA electromagnetic traces
2016/1/4
Side channel attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. The energy consumption of the chip that p...
On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$
secret-key cryptography
2012/3/26
We present a study on the algebraic degree of iterated permutations seen as multivari- ate polynomials. Our main result shows that this degree depends on the algebraic degree of the inverse of the per...
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
DPA attacks CMOS cryptographic devices leakage behavior
2008/11/26
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior.