搜索结果: 1-15 共查到“知识库 devices”相关记录258条 . 查询时间(0.109 秒)
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
Towards Optimized and Constant-Time CSIDH on Embedded Devices
commutative supersingular isogeny constant-time embedded devices
2019/3/21
We present an optimized, constant-time software library for commutative supersingular isogeny Diffie-Hellman key exchange (CSIDH) proposed by Castryck et al. which targets 64-bit ARM processors. The p...
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
Post-quantum cryptography supersingular isogeny SIDH
2018/11/8
The quantum secure supersingular isogeny Diffie-Hellman (SIDH) key exchange is a promising candidate in NIST's on-going post-quantum standardization process. The evaluation of various implementation c...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
public-key cryptography Embedded Devices
2018/9/6
We show how to implement the Montgomery reduction algorithm for isogeny based cryptography such that it can utilize the "unsigned multiply accumulate accumulate long" instruction present on modern ARM...
Standard Lattice-Based Key Encapsulation on Embedded Devices
Post-quantum cryptography standard lattices Frodo
2018/7/18
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al. proposed the key exchange...
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Power analysis SW-CPA Jittered clocks
2018/4/9
Power analysis side channel attacks rely on aligned traces. As a counter-measure, devices can use a jittered clock to misalign the power traces. In this paper we suggest a way to overcome this counter...
LOW-COST 3D DEVICES AND LASER SCANNERS COMPARISON FOR THE APPLICATION IN ORTHOPEDIC CENTRES
Low-cost 3D sensors Biomedical applications 3D Metrology Resolution Systematic error
2018/6/4
Low-cost 3D sensors are nowadays widely diffused and many different solutions are available on the market. Some of these devices were developed for entertaining purposes, but are used also for acquisi...
3D VIRTUAL CH INTERACTIVE INFORMATION SYSTEMS FOR A SMART WEB BROWSING EXPERIENCE FOR DESKTOP PCS AND MOBILE DEVICES
3D model Cultural Heritage WebGL ICT UAV Photogrammetry HTML5
2018/6/5
Recently, the diffusion of knowledge on Cultural Heritage (CH) has become an element of primary importance for its valorization. At the same time, the diffusion of surveys based on UAV Unmanned Aerial...
3D MODELS FOR ALL: LOW-COST ACQUISITION THROUGH MOBILE DEVICES IN COMPARISON WITH IMAGE BASED TECHNIQUES. POTENTIALITIES AND WEAKNESSES IN CULTURAL HERITAGE DOMAIN
Structure from Motion Image Based Modelling Mobile devices 3D Imaging Representation Techniques
2018/3/6
Nowadays, 3D digital imaging proposes effective solutions for preserving the expression of human creativity across the centuries, as well as is a great tool to guarantee global dissemination of knowle...
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of prot...
Secure Code Updates for Smart Embedded Devices based on PUFs
Secure Code Update PUF Remote Attestation
2017/10/12
Code update is a very useful tool commonly used in low-end embedded devices to improve the existing functionalities or patch discovered bugs or vulnerabilities. If the update protocol itself is not se...
FourQ on embedded devices with strong countermeasures against side-channel attacks
Elliptic curves FourQ ECDH
2017/5/23
This work deals with the energy-efficient, high-speed and high-security implementation of elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and elliptic curve dig...
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring a...
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2016/12/8
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underlying k...