搜索结果: 1-15 共查到“军事学 SECOND-ORDER”相关记录17条 . 查询时间(0.092 秒)
Second-order analyses have shown a great interest to defeat first level of masking protections. Their practical realization remains tedious in a lot of cases. This is partly due to the difficulties of...
The LLL algorithm (from Lenstra, Lenstra and Lovász) and its generalization BKZ (from Schnorr and Euchner) are widely used in cryptanalysis, especially for lattice-based cryptography. Precisely unders...
Time-Frequency Analysis for Second-Order Attacks
Bi-variate attacks zero-offset 2O-CPA discrete Hartley transform
2016/12/10
Second-order side-channel attacks are used to break first-order masking protections. A practical reason which often limits the efficiency of second-order attacks is the temporal localisation of the le...
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Pairing-Based Cryptography Fault Attacks eta Pairing
2016/1/8
Several fault attacks against pairing-based cryptography have been described theoretically in recent years.
Interestingly, none of these has been practically evaluated. We accomplish this task and pr...
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
side-channel analysis threshold implementation Boolean masking
2016/1/4
A common countermeasure to thwart side-channel analysis
attacks is algorithmic masking. For this, algorithms that mix Boolean
and arithmetic operations need to either apply two different masking
sc...
A New Second Order Side Channel Attack Based on Linear Regression
applications / Side-Channel tochastic Masking Second-Order inear Regression
2012/3/26
Embedded implementations of cryptographic primitives need protection against Side Channel Analysis. Stochastic attacks, introduced by Schindler et al. at CHES 2005, are an example of such an analysis....
The Good lower bound of Second-order nonlinearity of a class of Boolean function
Boolean function Higher-order derivatives Second-order nonlinearit Walsh-spectrum
2012/3/26
this paper we find the lower bound of second-order nonlinearity of Boolean function $f_{\lambda}(x) = Tr_{1}^{n}(\lambda x^{p})$ with $p = 2^{2r} + 2^{r} + 1$, $\lambda \in \mathbb{F}_{2^{r}}^{*}$ and...
On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions
secret-key cryptography
2012/3/29
In this paper we find a lower bound of the second-order nonlinearities of Boolean bent functions of the form $f(x) = Tr_{1}^{n}(\alpha_{1}x^{d_{1}} + \alpha_{2}x^{d_{2}})$,where $d_1$ and $d_2$ are Ni...
Maiorana-McFarland Functions with High Second-Order Nonlinearity
secret-key cryptography / boolean functions
2012/3/28
The second-order nonlinearity, and the best quadratic approximations, of Boolean functions are studied in this paper. We prove that cubic functions within the Maiorana-McFarland class achieve very hig...
Statistical Analysis of Second Order Differential Power Analysis
Embedded systems security cryptographic implementations side channel analysis higher order differential power analysis
2010/12/22
Second Order Differential Power Analysis (2ODPA) is a powerful side channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2ODPA, higher order masking may b...
On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
secret-key cryptography Boolean functions bent functions derivatives second-order nonlinearity
2010/7/13
In this paper we study the lower bounds of second-order nonlinearities of bent functions constructed by modifying certain cubic Maiorana-McFarland type bent functions.
The World is Not Enough:Another Look on Second-Order DPA
World Another Look Second-Order DPA
2010/4/7
In a recent work, Mangard et al. showed that under certain
assumptions, the (so-called) standard univariate side-channel attacks using
a distance-of-means test, correlation analysis and Gaussian tem...
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
cryptography derivative the second nonlinearity
2010/1/18
It is a difficult task to compute the r-th order nonlinearity of a given function with algebraic degree strictly greater than r > 1. Even the lower bounds on the second order nonlinearity is known onl...
On second order nonlinearities of cubic monomial Boolean functions
Boolean functions monomial functions cubic functions
2009/11/18
We study cubic monomial Boolean functions of the form Trn
1 (x2i+2j+1) where
2 F2n. We prove that the functions of this form do not have any ane derivative.
A lower bound on the second order no...
On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
Boolean functions derivative second order nonlinearity
2009/6/12
The r-th order nonlinearity of a Boolean function is an important cryptographic
criterion in analyzing the security of stream as well as block ciphers. It is also impor-
tant in coding theory as it ...