Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Cache Attacks Enable Bulk Key Recovery on the Cloud 缓存攻击启用云上的批量密钥恢复
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_18
Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui Apecechea, T. Eisenbarth, B. Sunar
{"title":"Cache Attacks Enable Bulk Key Recovery on the Cloud","authors":"Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui Apecechea, T. Eisenbarth, B. Sunar","doi":"10.1007/978-3-662-53140-2_18","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_18","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough 微分计算分析:隐藏白盒设计是不够的
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_11
Joppe W. Bos, Charles Hubain, Wil Michiels, P. Teuwen
{"title":"Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough","authors":"Joppe W. Bos, Charles Hubain, Wil Michiels, P. Teuwen","doi":"10.1007/978-3-662-53140-2_11","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_11","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114985399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 113
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture 反内核:一个分散的安全硬件软件操作系统架构
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_12
Andrew D. Zonenberg, B. Yener
{"title":"Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture","authors":"Andrew D. Zonenberg, B. Yener","doi":"10.1007/978-3-662-53140-2_12","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_12","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation 通过压缩加解密数据路径的高吞吐量/门AES硬件架构——迈向高效的cbc模式实现
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_26
Rei Ueno, S. Morioka, N. Homma, T. Aoki
{"title":"A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation","authors":"Rei Ueno, S. Morioka, N. Homma, T. Aoki","doi":"10.1007/978-3-662-53140-2_26","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_26","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114336728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
QcBits: Constant-Time Small-Key Code-Based Cryptography QcBits:基于恒定时间小密钥密码的密码学
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_14
T. Chou
{"title":"QcBits: Constant-Time Small-Key Code-Based Cryptography","authors":"T. Chou","doi":"10.1007/978-3-662-53140-2_14","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_14","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115148693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks 一种隐身参数木马的设计方法及其在漏洞攻击中的应用
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_30
S. Ghandali, G. Becker, Daniel E. Holcomb, C. Paar
{"title":"A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks","authors":"S. Ghandali, G. Becker, Daniel E. Holcomb, C. Paar","doi":"10.1007/978-3-662-53140-2_30","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_30","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123554725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach 使用直方图的简单键枚举(和秩估计):一种综合方法
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_4
R. Poussier, François-Xavier Standaert, Vincent Grosso
{"title":"Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach","authors":"R. Poussier, François-Xavier Standaert, Vincent Grosso","doi":"10.1007/978-3-662-53140-2_4","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_4","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation 相关的额外约简打败了盲法正则幂
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_1
Margaux Dugardin, S. Guilley, J. Danger, Zakaria Najm, O. Rioul
{"title":"Correlated Extra-Reductions Defeat Blinded Regular Exponentiation","authors":"Margaux Dugardin, S. Guilley, J. Danger, Zakaria Najm, O. Rioul","doi":"10.1007/978-3-662-53140-2_1","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_1","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Run-Time Accessible DRAM PUFs in Commodity Devices 商用设备中运行时可访问的DRAM puf
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_21
Wenjie Xiong, André Schaller, N. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
{"title":"Run-Time Accessible DRAM PUFs in Commodity Devices","authors":"Wenjie Xiong, André Schaller, N. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer","doi":"10.1007/978-3-662-53140-2_21","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_21","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields FPGA上的4个π:大素数特征域上椭圆曲线加密的新硬件速度记录
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_25
K. Järvinen, Andrea Miele, R. Azarderakhsh, P. Longa
{"title":"Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields","authors":"K. Järvinen, Andrea Miele, R. Azarderakhsh, P. Longa","doi":"10.1007/978-3-662-53140-2_25","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_25","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127348308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信