نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2004
Elena Trichina Lesya Korkishko

In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks, this task became even more difficult because a programmer must take into account countermeasures against such attacks, which often increases computational time, or memory requirements, or both. In this paper we descr...

Journal: :J. Inf. Sec. Appl. 2017
Stavros D. Nikolopoulos Iosif Polenakis

We study the propagation of a malicious software in a network of mobile devices, which are moving in a specific city area, and establish time bounds for the activation of a countermeasure, i.e., an antivirus or a cleaner in order to prevent pandemic. More precisely, given an initial infected population (mobile devices), we establish upper bounds on the time needed for a counter-measure to take ...

2012
Oscar Reparaz Benedikt Gierlichs Ingrid Verbauwhede

Masking on the algorithm level, i.e. concealing all sensitive intermediate values with random data, is a popular countermeasure against DPA attacks. A properly implemented masking scheme forces an attacker to apply a higher-order DPA attack. Such attacks are known to require a number of traces growing exponentially in the attack order, and computational power growing combinatorially in the numb...

2015
Alexander DeTrano Naghmeh Karimi Ramesh Karri Xiaofei Guo Claude Carlet Sylvain Guilley

Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvola...

2013
Lele Xia Xinlan Zhang

Small and medium-sized enterprises public service platform(SMEPSP for short in the following paper) is a comprehensive service platform to provide services such as technology innovation, financing guarantee, business supporting and management consulting to small and medium-sized enterprise(SME for short in the following paper). This article is based on questionnaire surveys and interviews to th...

Journal: :Sustainability 2023

How to accelerate the reduction of carbon emissions in context “double carbon” target has become a key concern for all sectors society. This paper firstly analyzes influence mechanism foreign direct investment (FDI) agglomeration on emission intensity, from theoretical perspective. Then, based panel data 270 cities China 2006 2019, this uses ArcGIS software visually analyze spatial and temporal...

Journal: :Informatica (Slovenia) 2002
Adrian Spalka Armin B. Cremers Hanno Langweg

Electronic signatures are introduced by more and more countries as legally binding means for signing electronic documents with the primary hope of boosting e-commerce and e-government. Given that the underlying cryptographic methods are sufficiently strong, attacks by Trojan horse programs on electronic signatures are becoming increasingly popular. Most of the current systems either employ cost...

2007
Stefan Tillich Johann Großschädl

In recent years, different instruction set extensions for cryptography have been proposed for integration into general-purpose RISC processors. Both public-key and secret-key algorithms can profit tremendously from a small set of custom instructions specifically designed to accelerate performance-critical code sections. While the impact of instruction set extensions on performance and silicon a...

Journal: :Radiation and environmental biophysics 2000
N M Crout N A Beresford R W Mayes P J MacEachern C L Barnett C S Lamb B J Howard

Previously reported models for radioiodine in ruminants cannot account for the effect of variations in stable iodine intake including large countermeasure doses of stable iodine on the transfer of radioiodine to goat milk. A metabolically based model of radioiodine transfer in goats has been parameterised using new experimental data on the effect of countermeasure doses of stable iodine on radi...

Journal: :IACR Cryptology ePrint Archive 2015
Pierre-Alain Fouque Sylvain Guilley Cédric Murdica David Naccache

ecdsa is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Cryptography (ecc) against Simple Power Analysis, many countermeasures have been proposed. Doubling and Additions of points on the given elliptic curve require several additions and multiplications in the base field and th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید