Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Non-invasive Spoofing Attacks for Anti-lock Braking Systems 防抱死制动系统的非侵入式欺骗攻击
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2013-08-20 DOI: 10.1007/978-3-642-40349-1_4
Yasser Shoukry, Paul D. Martin, P. Tabuada, M. Srivastava
{"title":"Non-invasive Spoofing Attacks for Anti-lock Braking Systems","authors":"Yasser Shoukry, Paul D. Martin, P. Tabuada, M. Srivastava","doi":"10.1007/978-3-642-40349-1_4","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_4","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133990687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 238
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA 反馈减少:时序抵抗和DPA感知模块化乘法加:如何通过DPA破坏RSA
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_27
M. Vielhaber
{"title":"Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA","authors":"M. Vielhaber","doi":"10.1007/978-3-642-33027-8_27","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_27","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"31 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 超越汉明权泄漏模型的代数侧信道攻击
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_9
Yossef Oren, M. Renauld, François-Xavier Standaert, A. Wool
{"title":"Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model","authors":"Yossef Oren, M. Renauld, François-Xavier Standaert, A. Wool","doi":"10.1007/978-3-642-33027-8_9","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_9","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"23 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126153647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes 现代基于格的加密方案的硬件构建模块设计
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_30
Norman Göttert, Thomas Feller, Michael Schneider, J. Buchmann, S. Huss
{"title":"On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes","authors":"Norman Göttert, Thomas Feller, Michael Schneider, J. Buchmann, S. Huss","doi":"10.1007/978-3-642-33027-8_30","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_30","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115507993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
Selecting Time Samples for Multivariate DPA Attacks 多元DPA攻击的时间样本选择
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_10
Oscar Reparaz, Benedikt Gierlichs, I. Verbauwhede
{"title":"Selecting Time Samples for Multivariate DPA Attacks","authors":"Oscar Reparaz, Benedikt Gierlichs, I. Verbauwhede","doi":"10.1007/978-3-642-33027-8_10","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_10","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117351940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon PUFs:神话,事实还是终结?硅中物理不可克隆函数(PUFs)的安全性评价
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_17
S. Katzenbeisser, Ünal Koçabas, Vladimir Rožić, A. Sadeghi, I. Verbauwhede, C. Wachsmann
{"title":"PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon","authors":"S. Katzenbeisser, Ünal Koçabas, Vladimir Rožić, A. Sadeghi, I. Verbauwhede, C. Wachsmann","doi":"10.1007/978-3-642-33027-8_17","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_17","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"34 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 251
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip 突破硅扫描发现军用芯片的后门
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_2
S. Skorobogatov, C. Woods
{"title":"Breakthrough Silicon Scanning Discovers Backdoor in Military Chip","authors":"S. Skorobogatov, C. Woods","doi":"10.1007/978-3-642-33027-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114427968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 286
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes 所有3个×3和4个×4 s - box的阈值实现
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_5
Begül Bilgin, S. Nikova, V. Nikov, V. Rijmen, Georg Stütz
{"title":"Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes","authors":"Begül Bilgin, S. Nikova, V. Nikov, V. Rijmen, Georg Stütz","doi":"10.1007/978-3-642-33027-8_5","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_5","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Practical Leakage-Resilient Symmetric Cryptography 实用防泄漏对称密码学
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_13
Sebastian Faust, Krzysztof Pietrzak, J. Schipper
{"title":"Practical Leakage-Resilient Symmetric Cryptography","authors":"Sebastian Faust, Krzysztof Pietrzak, J. Schipper","doi":"10.1007/978-3-642-33027-8_13","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_13","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128804609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs 基于高效防泄漏PRFs的超指数侧信道安全性研究
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2012-09-09 DOI: 10.1007/978-3-642-33027-8_12
M. Medwed, François-Xavier Standaert, A. Joux
{"title":"Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs","authors":"M. Medwed, François-Xavier Standaert, A. Joux","doi":"10.1007/978-3-642-33027-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-33027-8_12","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134308251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信