Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Strong Machine Learning Attack Against PUFs with No Mathematical Model 无数学模型puf的强机器学习攻击
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_19
F. Ganji, Shahin Tajik, F. Fäßler, Jean-Pierre Seifert
{"title":"Strong Machine Learning Attack Against PUFs with No Mathematical Model","authors":"F. Ganji, Shahin Tajik, F. Fäßler, Jean-Pierre Seifert","doi":"10.1007/978-3-662-53140-2_19","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_19","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
No Place to Hide: Contactless Probing of Secret Data on FPGAs 无处藏身:fpga上秘密数据的非接触式探测
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_8
Heiko Lohrke, Shahin Tajik, C. Boit, Jean-Pierre Seifert
{"title":"No Place to Hide: Contactless Probing of Secret Data on FPGAs","authors":"Heiko Lohrke, Shahin Tajik, C. Boit, Jean-Pierre Seifert","doi":"10.1007/978-3-662-53140-2_8","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_8","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme ISW掩蔽方案下的水平侧信道攻击与对抗
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_2
Alberto Battistello, J. Coron, E. Prouff, R. Zeitoun
{"title":"Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme","authors":"Alberto Battistello, J. Coron, E. Prouff, R. Zeitoun","doi":"10.1007/978-3-662-53140-2_2","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Physical Layer Group Key Agreement for Automotive Controller Area Networks 汽车控制器区域网络物理层组密钥协议
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_5
Shalabh Jain, J. Guajardo
{"title":"Physical Layer Group Key Agreement for Automotive Controller Area Networks","authors":"Shalabh Jain, J. Guajardo","doi":"10.1007/978-3-662-53140-2_5","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_5","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications puf诱导秘密的高效模糊提取:理论与应用
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_20
Jeroen Delvaux, Dawu Gu, I. Verbauwhede, Matthias Hiller, M. Yu
{"title":"Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications","authors":"Jeroen Delvaux, Dawu Gu, I. Verbauwhede, Matthias Hiller, M. Yu","doi":"10.1007/978-3-662-53140-2_20","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_20","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"32 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
- vatiCAN - Vetted, Authenticated CAN Bus -梵蒂冈-审查,认证的CAN总线
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_6
S. Nürnberger, C. Rossow
{"title":"- vatiCAN - Vetted, Authenticated CAN Bus","authors":"S. Nürnberger, C. Rossow","doi":"10.1007/978-3-662-53140-2_6","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_6","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"12 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Software Implementation of Koblitz Curves over Quadratic Fields 二次域上Koblitz曲线的软件实现
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-08-17 DOI: 10.1007/978-3-662-53140-2_13
Thomaz Oliveira, J. C. López-Hernández, F. Rodríguez-Henríquez
{"title":"Software Implementation of Koblitz Curves over Quadratic Fields","authors":"Thomaz Oliveira, J. C. López-Hernández, F. Rodríguez-Henríquez","doi":"10.1007/978-3-662-53140-2_13","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_13","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124560334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers 微控制器上的高效超椭圆签名和密钥交换
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2016-04-20 DOI: 10.1007/978-3-662-53140-2_15
Joost Renes, P. Schwabe, Benjamin A. Smith, L. Batina
{"title":"mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers","authors":"Joost Renes, P. Schwabe, Benjamin A. Smith, L. Batina","doi":"10.1007/978-3-662-53140-2_15","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_15","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121137336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC 基于单基模乘法的高效ECC硬件RNS实现
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2015-09-13 DOI: 10.1007/978-3-662-48324-4_7
Karim Bigou, A. Tisserand
{"title":"Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC","authors":"Karim Bigou, A. Tisserand","doi":"10.1007/978-3-662-48324-4_7","DOIUrl":"https://doi.org/10.1007/978-3-662-48324-4_7","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
TriviA: A Fast and Secure Authenticated Encryption Scheme 一个快速和安全的认证加密方案
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2015-09-13 DOI: 10.1007/978-3-662-48324-4_17
Avik Chakraborti, A. Chattopadhyay, Muhammad Hassan, M. Nandi
{"title":"TriviA: A Fast and Secure Authenticated Encryption Scheme","authors":"Avik Chakraborti, A. Chattopadhyay, Muhammad Hassan, M. Nandi","doi":"10.1007/978-3-662-48324-4_17","DOIUrl":"https://doi.org/10.1007/978-3-662-48324-4_17","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"2490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信