搜索结果: 1-15 共查到“军队指挥学 Masking”相关记录77条 . 查询时间(0.062 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Masking Post-quantum Cryptography
2019/8/8
With the rising popularity of lattice-based cryptography, the Learning with Errors (LWE) problem has emerged as a fundamental core of numerous encryption and key exchange schemes. Many LWE-based schem...
We introduce and study the notion of keyless fuzzy search (KlFS) which allows to mask a publicly available database in such a way that any third party can retrieve content if and only if it possesses ...
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Efficient Implementation Side-Channel Evaluation
2019/4/22
Although security against side-channel attacks is not an explicit design criterion of the NIST post-quantum standardization effort, it is certainly a major concern for schemes that are meant for real-...
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
side-channel probing model transitional leakage
2018/11/21
Recently, Gross et al. demonstrated a first-order probing-secure implementation of AES using only two bits of randomness for both the initial sharing and the entire computation of AES. In this note, w...
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
masking shuffling RNG
2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multipli...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though masking was invented almost 20 years ago, research on the efficient implementation of masking continues...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Side Channel Analysis Masking Countermeasures DPA Contest
2018/8/20
Low Entropy Masking Scheme (LEMS) has attracted wide attention for its low-cost feature of small fixed mask sets in Side-Channel-Analysis (SCA). To achieve the expected side channel security, it is ne...
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
Secure Oblivious Transfer from Semi-Commutative Masking
oblivious transfer UC security group action
2018/7/9
In this work we first define semi-commutative (invertible) masking structures which present a simple abstraction to capture the various examples of protocol design that are based on exponentiation-onl...