Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption 基于掩码格加密的单道侧信道攻击
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_25
R. Primas, P. Pessl, S. Mangard
{"title":"Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption","authors":"R. Primas, P. Pessl, S. Mangard","doi":"10.1007/978-3-319-66787-4_25","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_25","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption 礼物:一个小礼物——迈向轻量级加密的极限
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_16
S. Banik, S. Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
{"title":"GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption","authors":"S. Banik, S. Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo","doi":"10.1007/978-3-319-66787-4_16","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_16","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"87 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 261
Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices 使密码认证密钥交换适用于资源受限的工业控制设备
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_17
Björn Haase, Benoît Labrique
{"title":"Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices","authors":"Björn Haase, Benoît Labrique","doi":"10.1007/978-3-319-66787-4_17","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_17","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware 如何通过恶意硬件破坏FPGA soc上的安全启动
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_21
Nisha Jacob, Johann Heyszl, A. Zankl, C. Rolfes, G. Sigl
{"title":"How to Break Secure Boot on FPGA SoCs Through Malicious Hardware","authors":"Nisha Jacob, Johann Heyszl, A. Zankl, C. Rolfes, G. Sigl","doi":"10.1007/978-3-319-66787-4_21","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_21","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
PRESENT Runs Fast - Efficient and Secure Implementation in Software 目前运行快速,高效和安全的软件实现
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_31
Tiago B. S. Reis, Diego F. Aranha, J. C. López-Hernández
{"title":"PRESENT Runs Fast - Efficient and Secure Implementation in Software","authors":"Tiago B. S. Reis, Diego F. Aranha, J. C. López-Hernández","doi":"10.1007/978-3-319-66787-4_31","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_31","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Gimli : A Cross-Platform Permutation Gimli:跨平台组合
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_15
D. Bernstein, Stefan Kölbl, S. Lucks, P. Massolino, Florian Mendel, K. Nawaz, Tobias Schneider, P. Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
{"title":"Gimli : A Cross-Platform Permutation","authors":"D. Bernstein, Stefan Kölbl, S. Lucks, P. Massolino, Florian Mendel, K. Nawaz, Tobias Schneider, P. Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier","doi":"10.1007/978-3-319-66787-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_15","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures s盒的广义多项式分解及其在侧信道对抗中的应用
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_8
Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, S. Vivek
{"title":"Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures","authors":"Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, S. Vivek","doi":"10.1007/978-3-319-66787-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_8","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116252309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY 位滑动:基于spn原语的位串行实现的通用技术- AES的应用,PRESENT和SKINNY
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_33
J. Jean, A. Moradi, Thomas Peyrin, Pascal Sasdrich
{"title":"Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY","authors":"J. Jean, A. Moradi, Thomas Peyrin, Pascal Sasdrich","doi":"10.1007/978-3-319-66787-4_33","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_33","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"10 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114033285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Four mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks 嵌入式设备抗侧信道攻击强对策的四mathbb Q
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2017-09-25 DOI: 10.1007/978-3-319-66787-4_32
Zhe Liu, P. Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
{"title":"Four mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks","authors":"Zhe Liu, P. Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo","doi":"10.1007/978-3-319-66787-4_32","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_32","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125602505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis Rowhammer的奇特案例:使用时序分析翻转秘密指数位
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_29
Sarani Bhattacharya, Debdeep Mukhopadhyay
{"title":"Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis","authors":"Sarani Bhattacharya, Debdeep Mukhopadhyay","doi":"10.1007/978-3-662-53140-2_29","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_29","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信