نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
Engineering the right software requirements under the right environment assumptions is a critical precondition for developing the right software. Requirements completeness, in particular, is known to be among the most critical and difficult software engineering challenges. Missing requirements often result from poor risk analysis at requirements engineering time. A natural inclination to concei...
We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also e...
With multimedia developing rapidly, copyright protection and authentication is more and more important. Digital watermark is one of the most efficient methods to protect multimedia products. Print and scan attack is a challenging problem for most of digital watermarks. In this paper, the geometric distortion and halftone in print-and-scan process is analyzed for the sake of presenting a model o...
Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography ag...
We describe a new technique for improving the efficiency of the masking countermeasure against side-channel attacks. Our technique is based on using common shares between secret variables, in order to reduce the number of finite field multiplications. Our algorithms are proven secure in the ISW probing model with n > t + 1 shares against t probes. For AES, we get an equivalent of 2.8 nonlinear ...
From many aspects such as the resource construction, the talent group, and the mechanism and system, main factors to restrain the development of college library are analyzed, and corresponding countermeasures are proposed in this article.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix CHAPTER
Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using different variations of secret-sharing and implementation techniques. For instance, Direct Sharing (4-shares) is the most straightforward implementation of the threshold countermeasure. But, its usage...
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel attacks monitor power consumption and even exploit the leakage information related to power consumption to reveal bits of a secret key d although d is hidden inside a smart card. Almost public key cryptosystems includi...
This paper identifies vulnerabilities to recently proposed countermeasures leakage power analysis attacks in FDSOI systems based on the application of a random body bias. The are analyzed and relative difficulty obtain secret key, once taken into account, compared original proposals. A new countermeasure, bias scheme, is then proposed. countermeasure equalization asymmetries static consumption ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید