نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks, this task became even more difficult because a programmer must take into account countermeasures against such attacks, which often increases computational time, or memory requirements, or both. In this paper we descr...
We study the propagation of a malicious software in a network of mobile devices, which are moving in a specific city area, and establish time bounds for the activation of a countermeasure, i.e., an antivirus or a cleaner in order to prevent pandemic. More precisely, given an initial infected population (mobile devices), we establish upper bounds on the time needed for a counter-measure to take ...
Masking on the algorithm level, i.e. concealing all sensitive intermediate values with random data, is a popular countermeasure against DPA attacks. A properly implemented masking scheme forces an attacker to apply a higher-order DPA attack. Such attacks are known to require a number of traces growing exponentially in the attack order, and computational power growing combinatorially in the numb...
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvola...
Small and medium-sized enterprises public service platform(SMEPSP for short in the following paper) is a comprehensive service platform to provide services such as technology innovation, financing guarantee, business supporting and management consulting to small and medium-sized enterprise(SME for short in the following paper). This article is based on questionnaire surveys and interviews to th...
The Effect of FDI Agglomeration on Carbon Emission Intensity: Evidence from City-Level Data in China
How to accelerate the reduction of carbon emissions in context “double carbon” target has become a key concern for all sectors society. This paper firstly analyzes influence mechanism foreign direct investment (FDI) agglomeration on emission intensity, from theoretical perspective. Then, based panel data 270 cities China 2006 2019, this uses ArcGIS software visually analyze spatial and temporal...
Electronic signatures are introduced by more and more countries as legally binding means for signing electronic documents with the primary hope of boosting e-commerce and e-government. Given that the underlying cryptographic methods are sufficiently strong, attacks by Trojan horse programs on electronic signatures are becoming increasingly popular. Most of the current systems either employ cost...
In recent years, different instruction set extensions for cryptography have been proposed for integration into general-purpose RISC processors. Both public-key and secret-key algorithms can profit tremendously from a small set of custom instructions specifically designed to accelerate performance-critical code sections. While the impact of instruction set extensions on performance and silicon a...
Previously reported models for radioiodine in ruminants cannot account for the effect of variations in stable iodine intake including large countermeasure doses of stable iodine on the transfer of radioiodine to goat milk. A metabolically based model of radioiodine transfer in goats has been parameterised using new experimental data on the effect of countermeasure doses of stable iodine on radi...
ecdsa is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Cryptography (ecc) against Simple Power Analysis, many countermeasures have been proposed. Doubling and Additions of points on the given elliptic curve require several additions and multiplications in the base field and th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید