Workshop on Cryptographic Hardware and Embedded Systems最新文献

筛选
英文 中文
Secure Conversion between Boolean and Arithmetic Masking of Any Order 任意阶的布尔掩码与算术掩码之间的安全转换
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_11
J. Coron, J. Großschädl, Praveen Kumar Vadnala
{"title":"Secure Conversion between Boolean and Arithmetic Masking of Any Order","authors":"J. Coron, J. Großschädl, Praveen Kumar Vadnala","doi":"10.1007/978-3-662-44709-3_11","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_11","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Entropy Evaluation for Oscillator-Based True Random Number Generators 基于振子的真随机数生成器的熵评价
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_30
Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing
{"title":"Entropy Evaluation for Oscillator-Based True Random Number Generators","authors":"Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing","doi":"10.1007/978-3-662-44709-3_30","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_30","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Compact Ring-LWE Cryptoprocessor 紧凑型环- lwe密码处理器
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_21
S. Roy, F. Vercauteren, N. Mentens, Donald Donglong Chen, I. Verbauwhede
{"title":"Compact Ring-LWE Cryptoprocessor","authors":"S. Roy, F. Vercauteren, N. Mentens, Donald Donglong Chen, I. Verbauwhede","doi":"10.1007/978-3-662-44709-3_21","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_21","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 246
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks SPRING的FPGA实现及其对侧信道攻击的对策
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_23
H. Brenner, Lubos Gaspar, G. Leurent, Alon Rosen, François-Xavier Standaert
{"title":"FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks","authors":"H. Brenner, Lubos Gaspar, G. Leurent, Alon Rosen, François-Xavier Standaert","doi":"10.1007/978-3-662-44709-3_23","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_23","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"63 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Constructing S-boxes for Lightweight Cryptography with Feistel Structure 用Feistel结构构造轻量级密码的s盒
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2014-09-23 DOI: 10.1007/978-3-662-44709-3_8
Yongqiang Li, Mingsheng Wang
{"title":"Constructing S-boxes for Lightweight Cryptography with Feistel Structure","authors":"Yongqiang Li, Mingsheng Wang","doi":"10.1007/978-3-662-44709-3_8","DOIUrl":"https://doi.org/10.1007/978-3-662-44709-3_8","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133059337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Leakage-Resilient Symmetric Encryption via Re-keying 通过重密钥的防泄漏对称加密
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2013-08-20 DOI: 10.1007/978-3-642-40349-1_27
Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
{"title":"Leakage-Resilient Symmetric Encryption via Re-keying","authors":"Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque","doi":"10.1007/978-3-642-40349-1_27","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_27","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Sleuth: Automated Verification of Software Power Analysis Countermeasures 侦探:软件功率分析对策的自动验证
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2013-08-20 DOI: 10.1007/978-3-642-40349-1_17
Ali Galip Bayrak, F. Regazzoni, D. Novo, P. Ienne
{"title":"Sleuth: Automated Verification of Software Power Analysis Countermeasures","authors":"Ali Galip Bayrak, F. Regazzoni, D. Novo, P. Ienne","doi":"10.1007/978-3-642-40349-1_17","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_17","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123579627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Profiling DPA: Efficacy and Efficiency Trade-Offs 分析DPA:功效和效率权衡
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2013-08-20 DOI: 10.1007/978-3-642-40349-1_3
C. Whitnall, E. Oswald
{"title":"Profiling DPA: Efficacy and Efficiency Trade-Offs","authors":"C. Whitnall, E. Oswald","doi":"10.1007/978-3-642-40349-1_3","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_3","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121997760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Stealthy Dopant-Level Hardware Trojans 隐形掺杂级硬件木马
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2013-08-20 DOI: 10.1007/978-3-642-40349-1_12
G. Becker, F. Regazzoni, C. Paar, W. Burleson
{"title":"Stealthy Dopant-Level Hardware Trojans","authors":"G. Becker, F. Regazzoni, C. Paar, W. Burleson","doi":"10.1007/978-3-642-40349-1_12","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_12","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127118941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 247
A New Model for Error-Tolerant Side-Channel Cube Attacks 一种容错侧信道立方体攻击的新模型
Workshop on Cryptographic Hardware and Embedded Systems Pub Date : 2013-08-20 DOI: 10.1007/978-3-642-40349-1_26
Zhenqi Li, Bin Zhang, Junfeng Fan, I. Verbauwhede
{"title":"A New Model for Error-Tolerant Side-Channel Cube Attacks","authors":"Zhenqi Li, Bin Zhang, Junfeng Fan, I. Verbauwhede","doi":"10.1007/978-3-642-40349-1_26","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_26","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信