Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak 向右滑动进入灾难:从左到右滑动窗口泄漏
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_27
D. Bernstein, Joachim Breitner, Daniel Genkin, L. G. Bruinderink, N. Heninger, T. Lange, C. V. Vredendaal, Y. Yarom
{"title":"Sliding Right into Disaster: Left-to-Right Sliding Windows Leak","authors":"D. Bernstein, Joachim Breitner, Daniel Genkin, L. G. Bruinderink, N. Heninger, T. Lange, C. V. Vredendaal, Y. Yarom","doi":"10.1007/978-3-319-66787-4_27","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_27","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications 错觉和眩光:针对汽车应用激光雷达的对抗性光通道利用
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_22
Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
{"title":"Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications","authors":"Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim","doi":"10.1007/978-3-319-66787-4_22","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_22","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115778749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing 守卫的改变:阈值共享中实现一致性的一种简单有效的方法
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_7
J. Daemen
{"title":"Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing","authors":"J. Daemen","doi":"10.1007/978-3-319-66787-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_7","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Nanofocused X-Ray Beam to Reprogram Secure Circuits 纳米聚焦x射线束重新编程安全电路
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_9
Stéphanie Anceau, P. Bleuet, J. Clédière, L. Maingault, J. Rainard, R. Tucoulou
{"title":"Nanofocused X-Ray Beam to Reprogram Secure Circuits","authors":"Stéphanie Anceau, P. Bleuet, J. Clédière, L. Maingault, J. Rainard, R. Tucoulou","doi":"10.1007/978-3-319-66787-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_9","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Hiding Secrecy Leakage in Leaky Helper Data 在泄漏的Helper数据中隐藏保密泄漏
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_29
Matthias Hiller, Aysun Gurur Önalan
{"title":"Hiding Secrecy Leakage in Leaky Helper Data","authors":"Matthias Hiller, Aysun Gurur Önalan","doi":"10.1007/978-3-319-66787-4_29","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_29","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks 盲人黑客:(几乎)不可见的运行时用户界面攻击
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_23
Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun
{"title":"Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks","authors":"Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun","doi":"10.1007/978-3-319-66787-4_23","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_23","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes 基于fpga的二进制Goppa码下码密码系统密钥生成器
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_13
Wen Wang, Jakub Szefer, R. Niederhagen
{"title":"FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes","authors":"Wen Wang, Jakub Szefer, R. Niederhagen","doi":"10.1007/978-3-319-66787-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_13","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121088008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages 利用泄漏联合分布改进盲侧通道分析
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_2
Christophe Clavier, Léo Reynaud
{"title":"Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages","authors":"Christophe Clavier, Léo Reynaud","doi":"10.1007/978-3-319-66787-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123265533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing 具有数据增强的卷积神经网络对抗基于抖动的反分析攻击
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_3
Eleonora Cagli, Cécile Canovas, E. Prouff
{"title":"Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing","authors":"Eleonora Cagli, Cécile Canovas, E. Prouff","doi":"10.1007/978-3-319-66787-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_3","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 160
Reconciling d+1 Masking in Hardware and Software 在硬件和软件中协调d+1掩蔽
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_6
Hannes Gross, S. Mangard
{"title":"Reconciling d+1 Masking in Hardware and Software","authors":"Hannes Gross, S. Mangard","doi":"10.1007/978-3-319-66787-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_6","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信