Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG 基于振荡器的初等TRNG随机嵌入评价
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_29
V. Fischer, D. Lubicz
{"title":"Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG","authors":"V. Fischer, D. Lubicz","doi":"10.1007/978-3-662-44709-3_29","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_29","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"46 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Simple Power Analysis on AES Key Expansion Revisited AES密钥扩展的简单功率分析
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_16
Christophe Clavier, Damien Marion, Antoine Wurcker
{"title":"Simple Power Analysis on AES Key Expansion Revisited","authors":"Christophe Clavier, Damien Marion, Antoine Wurcker","doi":"10.1007/978-3-662-44709-3_16","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_16","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks 基于约束的概率模板侧信道攻击新框架
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_2
Yossef Oren, Ofir Weisse, A. Wool
{"title":"A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks","authors":"Yossef Oren, Ofir Weisse, A. Wool","doi":"10.1007/978-3-662-44709-3_2","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor EM攻击是非侵入性的吗?电磁攻击传感器的设计方法及有效性验证
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_1
N. Homma, Yu-ichi Hayashi, N. Miura, Daisuke Fujimoto, Daichi Tanaka, M. Nagata, T. Aoki
{"title":"EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor","authors":"N. Homma, Yu-ichi Hayashi, N. Miura, Daisuke Fujimoto, Daichi Tanaka, M. Nagata, T. Aoki","doi":"10.1007/978-3-662-44709-3_1","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_1","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Side-Channel Leakage through Static Power - Should We Care about in Practice? 静电引起的侧道泄漏——实践中应注意吗?
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_31
A. Moradi
{"title":"Side-Channel Leakage through Static Power - Should We Care about in Practice?","authors":"A. Moradi","doi":"10.1007/978-3-662-44709-3_31","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_31","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"54 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Efficient Power and Timing Side Channels for Physical Unclonable Functions 物理不可克隆功能的高效功率和时序侧通道
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_26
U. Rührmair, Xiaolin Xu, J. Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, F. Koushanfar, W. Burleson
{"title":"Efficient Power and Timing Side Channels for Physical Unclonable Functions","authors":"U. Rührmair, Xiaolin Xu, J. Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, F. Koushanfar, W. Burleson","doi":"10.1007/978-3-662-44709-3_26","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_26","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 130
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way “哦啊…“一点点”:少量的侧通道可以走很长的路
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_5
N. Benger, J. V. D. Pol, N. Smart, Y. Yarom
{"title":"\"Ooh Aah... Just a Little Bit\" : A Small Amount of Side Channel Can Go a Long Way","authors":"N. Benger, J. V. D. Pol, N. Smart, Y. Yarom","doi":"10.1007/978-3-662-44709-3_5","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_5","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132398167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 213
Entropy Evaluation for Oscillator-Based True Random Number Generators 基于振子的真随机数生成器的熵评价
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_30
Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing
{"title":"Entropy Evaluation for Oscillator-Based True Random Number Generators","authors":"Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing","doi":"10.1007/978-3-662-44709-3_30","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_30","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Compact Ring-LWE Cryptoprocessor 紧凑型环- lwe密码处理器
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_21
S. Roy, F. Vercauteren, N. Mentens, Donald Donglong Chen, I. Verbauwhede
{"title":"Compact Ring-LWE Cryptoprocessor","authors":"S. Roy, F. Vercauteren, N. Mentens, Donald Donglong Chen, I. Verbauwhede","doi":"10.1007/978-3-662-44709-3_21","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_21","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 246
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks SPRING的FPGA实现及其对侧信道攻击的对策
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_23
H. Brenner, Lubos Gaspar, G. Leurent, Alon Rosen, François-Xavier Standaert
{"title":"FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks","authors":"H. Brenner, Lubos Gaspar, G. Leurent, Alon Rosen, François-Xavier Standaert","doi":"10.1007/978-3-662-44709-3_23","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_23","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"63 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信