CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
对ECC算法实现的选择明文攻击方法 期刊论文
通信学报, 2014, 卷号: 35, 期号: 5, 页码: 79-87
罗鹏; 李慧云; 王鲲鹏; 王亚伟
收藏  |  浏览/下载:11/0  |  提交时间:2014/12/16
cube cryptanalysis of lblock with noisy leakage 会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations 会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo; Zhou Yongbin; Liu Jiye; Chen Danyang
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
polar differential power attacks and evaluation 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 7, 页码: 1588-1604
Tang Ming; Qiu ZhenLong; Gao Si; Yi Mu; Liu ShuBo; Zhang HuanGuo; Jin YingZhen
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/17
an new anti-spa algorithm of naf scalar multiplication used in ecc 期刊论文
International Journal of Advancements in Computing Technology, 2012, 卷号: 4, 期号: 20, 页码: 692-700
Luo Peng; Feng Dengguo; Zhou Yongbin
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/17
密码实现能量消耗指令级模拟系统的设计与实现 学位论文
硕士, 北京: 中国科学院研究生院, 2011
李建堂
收藏  |  浏览/下载:13/0  |  提交时间:2011/06/14
how to characterize side-channel leakages more accurately? 会议论文
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
收藏  |  浏览/下载:9/0  |  提交时间:2011/10/10
能量分析攻击有效性评估技术研究 学位论文
硕士, 北京: 中国科学院研究生院, 2010
黄金刚
收藏  |  浏览/下载:16/0  |  提交时间:2010/06/09
extended models for message authentication 会议论文
11th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 03-05,
Zhang Liting; Wu Wenling; Wang Peng
收藏  |  浏览/下载:6/0  |  提交时间:2011/03/20
error oracle attacks on several modes of operation 会议论文
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Wen FT; Wu WL; Wen QY
收藏  |  浏览/下载:5/0  |  提交时间:2011/07/28


©版权所有 ©2017 CSpace - Powered by CSpace