×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [14]
北京大学 [11]
深圳先进技术研究院 [11]
山东大学 [7]
西安交通大学 [6]
武汉大学 [4]
更多...
内容类型
期刊论文 [36]
会议论文 [21]
其他 [7]
学位论文 [4]
发表日期
2021 [1]
2020 [1]
2019 [2]
2018 [4]
2017 [8]
2016 [4]
更多...
学科主题
计算机科学技术其他学... [3]
计算机科学技术基础学... [3]
Computer S... [1]
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共68条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:
Zhao, Lutan
;
Li, Peinan
;
Hou, Rui
;
Huang, Michael C.
;
Liu, Peng
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2021/12/01
Security
Hazards
Micromechanical devices
Microarchitecture
Out of order
Registers
Spectre vulnerabilities defense
security dependence
speculative execution side-channel vulnerabilities
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
JOURNAL OF SUPERCOMPUTING, 2019, 卷号: 75, 期号: 6, 页码: 3099-3122
作者:
Hu, Chengyu
;
Yang, Rupeng
;
Liu, Pengtao
;
Li, Tong
;
Kong, Fanyu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Public-key encryption
Side-channel attacks
Tampering resilience
Leakage resilience
Continuous attacks
Detecting Android Side Channel Probing Attacks Based on System States
会议论文
14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, Honolulu, HI, United states, 2019-06-24
作者:
Lin, Qixiao
;
Mao, Jian
;
Shi, Futian
;
Zhu, Shishi
;
Liang, Zhenkai
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Fault Attack on ACORN v3
期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:
Zhang, Xiaojuan
;
Feng, Xiutao
;
Lin, Dongdai
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2018/09/08
CAESAR
authenticated cipher
stream cipher
ACORN
fault attack
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework
期刊论文
INTEGRATION-THE VLSI JOURNAL, 2018, 卷号: 60
作者:
Li, Yanbin
;
Tang, Ming
;
Li, Yuguang
;
Zhang, Huanguo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
secure masking scheme
Sensitive information reuse
Leakage of masking sequence
Side-channel attacks
Lightweight countermeasure
Side-Channel Attacks in a Real Scenario
期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 卷号: 23, 期号: 5
作者:
Tang, Ming
;
Luo, Maixing
;
Zhou, Junfeng
;
Yang, Zhen
;
Guo, Zhipeng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/05
side-channel attack
sliding window
trigger mechanism
soft K-means
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
Journal of Supercomputing, 2018
作者:
Hu C.
;
Yang R.
;
Liu P.
;
Li T.
;
Kong F.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
Continuous attacks
Leakage resilience
Public-key encryption
Side-channel attacks
Tampering resilience
Cross-VM Cache Side Channel Attacks in Cloud: A Survey
期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2017, 卷号: 40, 页码: 317-336
作者:
Liang, Xin
;
Gui, Xiao-Lin
;
Dai, Hui-Jun
;
Zhang, Chen
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/26
Cache
Computing resource
Future research directions
Private information
Side-channel information
Utilization efficiency
Virtual machine monitors
VMs co-residency
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 卷号: 93, 页码: 259-279
作者:
Anwar, Shahid
;
Inayat, Zakira
;
Zolkipli, Mohamad Fadli
;
Zain, Jasni Mohamad
;
Gani, Abdullah
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/26
Countermeasures
Cloud computing
Cache-based Side channel attacks
Cross-TM Cache-based side channel attacks
©版权所有 ©2017 CSpace - Powered by
CSpace