نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2008
Jean-Sébastien Coron

We propose and analyse a new countermeasure against Differential Power Analysis (DPA) for the AES encryption algorithm, based on permutation tables. As opposed to existing AES countermeasures, it does not use random masking. We prove that our new countermeasure is resistant against first-order DPA; we also show that it is quite efficient in practice.

2008
Vi Pham Zachary Taylor

In this report, we investigate the possibility of production of a novel new anthrax treatment with minimal side effects and virtually no possibility of bacterial resistance. The pharmaceutical is based on the innovative combination of two recently discovered components: an agent that aids the immune system in defeating an anthrax infection and the “bait” by which to attack the anthrax in vivo. ...

2010
Alessandro Barenghi Luca Breveglieri Israel Koren Gerardo Pelosi Francesco Regazzoni

In this paper we present software countermeasures specifically designed to counteract fault attacks during the execution of a software implementation of a cryptographic algorithm and analyze their efficiency. We propose two approaches that are based on the insertion of redundant computations and checks, which in their general form, are suitable for any cryptographic algorithm. In particular, we...

Journal: :journal of hydraulic structures 2013
somayeh soltani gerdefaramarzi hossein afzalimehr yee-meng chiew mohsen ghasemi

the effect of a combined system of the bed suction and jet injection as a pier-scour countermeasure on the turbulent flow field is studied in a laboratory flume using an acoustic doppler velocimeter (adv). the three components of the velocities in the vertical symmetry plane in the equilibrium scour hole in front and rear of the pier under 3-jet injections and bed suction rate qs/q0 = 2%located...

2012
Yuichi INOUE Kazuki MORI Seiichi KOMIYA

Success or failure of a software project mainly depends on the management capability of the project manager. Therefore, EVA (Earned Value Analysis) is gaining much attention recently as a method of managing a project in an integrated fashion by introducing a unified metric called EV (Earned Value) and quantitatively measuring and analyzing the cost and schedule of a project. Project managers ca...

Journal: :Microelectronics Reliability 2021

Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved be effective against identification routines encryption algorithms. Until recently, most research works assessed a model that consists in single skip, i.e. ability prevent one chosen program from being execut...

Journal: :IJSSE 2013
Jean Dubreuil Guillaume Bouffard Bhagyalekshmy N. Thampi Jean-Louis Lanet

One of the challenges for smart card deployment is the security interoperability. A smart card resistant to an attack on a given platform should be able to guarantee the same behavior on another platform. But the current implementations do not comply with this requirement. In order to improve such standardization the authors propose a framework based on annotations with an external pre-processi...

2014
Andrew P. Tarko Mingyang Li Mario Romero Jose Thomaz

The Joint Transportation Research Program serves as a vehicle for INDOT collaboration with higher education institutions and industry in Indiana to facilitate innovation that results in continuous improvement in the planning, design, construction, operation, management and economic efficiency of the Indiana transportation infrastructure. NOTICE The contents of this report reflect the views of t...

2004
Markus Klemen Stefan Biffl

Business success depends increasingly on reliable ITInfrastructure. IT-Security risk management aims at an optimal allocation of security resources regarding an “affordable” IT-Security level. In comparison to large corporations small and medium-sized enterprises (SMEs) typically have few resources and little expertise in IT-Security risk management. Therefore, they need SME-focused framework p...

Journal: :Annals of the New York Academy of Sciences 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید