搜索结果: 151-165 共查到“军事学 Attacks”相关记录783条 . 查询时间(0.121 秒)
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Keccak-MAC Divide-and-Conquer Attacks Cube Attacks
2018/1/17
Keccak is the final winner of SHA-3 competition and it can be used as message authentic codes as well. The basic and balanced divide-and-conquer attacks on Keccak-MAC were proposed by Dinur et al. at ...
In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implem...
Higher Order Side-Channel Attacks Resilient S-boxes
S-box construction Genetic algorithms Higher-order side-channel analysis
2018/1/12
Masking and hiding schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in term of p...
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Public Key Authenticated Encryption with Keyword Search Searchable Encryption Keyword Guessing Attack
2018/1/12
How to efficiently search over encrypted data is an important and interesting problem in the cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with keyword search (PE...
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
implementation side channels
2018/1/12
Motivated by the need to assess the concrete security of a device after a side channel attack, there has been a flurry of recent work designing both key rank and key enumeration algorithms. Two main c...
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions
Feistel network Grover's algorithm claw finding algorithm
2017/12/25
This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most power...
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
secure ranging physical layer security
2017/12/25
Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation o...
In this paper, we introduce CAPA: a combined countermeasure against physical attacks. Our countermeasure provides security against higher-order SCA, multiple-shot DFA and combined attacks, scales to a...
MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box
AES MixColumns key-recovery attack
2017/12/19
In this paper, we present new key-recovery attacks on AES with a single secret S-Box. Several attacks for this model have been proposed in literature, the most recent ones at Crypto’16 and FSE’17. Bot...
Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
side-channel attack SCA ECC
2017/12/19
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are particularly vulnerable because th...
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
cyclic circuit logic encryption circuit obfuscation
2017/12/11
The high cost of IC design has made chip protection one of the first priorities of the semiconductor industry. Although there is a common impression that combinational circuits must be designed withou...
Aggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider ...
Attacks on the PUF-Based Authentication Protocols YeHL16 and GaoMAAR17
PUF cryptographic protocols
2017/11/28
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence faci...
Differential Attacks on LILLIPUT Cipher
Differential cryptanalysis Improbable differential cryptanalysis Automated research of attacks
2017/11/27
In SAC 2013, Berger et al. defined Extended Generalized Feistel Networks (EGFN) and analyzed their security. Later, they proposed a cipher based on this structure: LILLIPUT. Impossible differential at...