Frontiers in Hardware Security and Trust; Theory, design and practice最新文献

筛选
英文 中文
Deployment of EMC techniques in design of IC chips for hardware security EMC技术在硬件安全集成电路芯片设计中的应用
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch3
{"title":"Deployment of EMC techniques in design of IC chips for hardware security","authors":"","doi":"10.1049/pbcs066e_ch3","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch3","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124146602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back Matter 回到问题
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_bm
{"title":"Back Matter","authors":"","doi":"10.1049/pbcs066e_bm","DOIUrl":"https://doi.org/10.1049/pbcs066e_bm","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidential and energy-efficient cognitive communications by physical-layer security 通过物理层安全实现机密和节能的认知通信
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch13
{"title":"Confidential and energy-efficient cognitive communications by physical-layer security","authors":"","doi":"10.1049/pbcs066e_ch13","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch13","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125037799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvements and recent updates of persistent fault analysis on block ciphers 分组密码持久故障分析的改进和最新更新
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch2
Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, S. Bhasin, Xin-jie Zhao, Shize Guo, K. Ren
{"title":"Improvements and recent updates of persistent fault analysis on block ciphers","authors":"Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, S. Bhasin, Xin-jie Zhao, Shize Guo, K. Ren","doi":"10.1049/pbcs066e_ch2","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch2","url":null,"abstract":"Persistence is an intrinsic nature of many errors yet has not been caught enough attractions for years. In this chapter, the feature of persistence is applied to fault attacks (FAs), and the persistent FA is proposed. Different from traditional FAs, adversaries can prepare the fault injection stage before the encryption stage, which relaxes the constraint of the tight-coupled time synchronization. The persistent fault analysis (PFA) is elaborated on different implementations of AES-128, specially fault-hardened implementations based on dual modular redundancy (DMR). Our experimental results show that PFA is quite simple and efficient in breaking these typical implementations. To show the feasibility and practicability of our attack, a case study is illustrated on a few countermeasures of masking. This work puts forward a new direction of FAs and can be extended to attack other implementations under more interesting scenarios.","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"44 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120992610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Micro-architectural attacks and countermeasures on public-key implementations 公钥实现的微体系结构攻击与对策
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch7
{"title":"Micro-architectural attacks and countermeasures on public-key implementations","authors":"","doi":"10.1049/pbcs066e_ch7","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch7","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating homomorphic encryption in hardware: a review 硬件加速同态加密:综述
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch11
{"title":"Accelerating homomorphic encryption in hardware: a review","authors":"","doi":"10.1049/pbcs066e_ch11","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch11","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security implications of non-digital components 非数字组件的安全含义
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch10
{"title":"Security implications of non-digital components","authors":"","doi":"10.1049/pbcs066e_ch10","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch10","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating the CACHEKIT attack 缓解CACHEKIT攻击
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch8
{"title":"Mitigating the CACHEKIT attack","authors":"","doi":"10.1049/pbcs066e_ch8","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch8","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical-layer security for mmWave massive MIMO communications in 5G networks 5G网络中毫米波大规模MIMO通信的物理层安全
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch14
{"title":"Physical-layer security for mmWave massive MIMO communications in 5G networks","authors":"","doi":"10.1049/pbcs066e_ch14","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch14","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silicon-based true random number generators 基于硅的真随机数生成器
Frontiers in Hardware Security and Trust; Theory, design and practice Pub Date : 2020-11-01 DOI: 10.1049/pbcs066e_ch6
{"title":"Silicon-based true random number generators","authors":"","doi":"10.1049/pbcs066e_ch6","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch6","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信