CORC

浏览/检索结果: 共21条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States 期刊论文
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:  Zhang, HuanGuo;  Liang, XiaoYan;  Wu, WanQing;  Cai, QingYu
收藏  |  浏览/下载:34/0  |  提交时间:2018/08/15
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 12
作者:  Tang Ming;  Wang Pengbo;  Ma Xiaoqi;  Chang Wenjie;  Zhang Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 卷号: 37, 期号: 12
作者:  Tang Ming;  Li Yanbin;  Zhao Dongyan;  Li Yuguang;  Yan Fei
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 卷号: 23, 期号: 5
作者:  Tang, Ming;  Li, Yuguang;  Li, Yanbin;  Wang, Pengbo;  Zhao, Dongyan
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
CYBERSPACE SECURITY: FOR A BETTER LIFE AND WORK 其他
2018-01-01
作者:  Zhang, Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
A security-enhanced vTPM 2.0 for cloud computing 会议论文
作者:  Wang, Juan;  Xiao, Feng;  Huang, Jianwei;  Zha, Daochen;  Fan, Chengyang
收藏  |  浏览/下载:17/0  |  提交时间:2019/12/05
A novel key agreement protocol based on RET gadget chains for preventing reused code attacks 期刊论文
IEEE Access, 2018, 卷号: 6
作者:  Fusheng, Wu;  Huanguo, Zhang;  Mingtao, Ni;  Jun, Wang;  Zhaoxu, Ji
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
A generic TC-based method to find the weakness in different phases of masking schemes 期刊论文
Tsinghua Science and Technology, 2018, 卷号: 23, 期号: 5
作者:  Tang, Ming;  Li, Yuguang;  Li, Yanbin;  Wang, Pengbo;  Zhao, Dongyan
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
基于对称矩阵分解的无线传感网密钥恢复攻击 期刊论文
通信学报, 2018, 卷号: 39, 期号: 10
作者:  Ji, Xiangmin;  Zhao, Bo;  Liu, Jinhui;  Jia, Jianwei;  Zhang, Huanguo
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework 期刊论文
INTEGRATION-THE VLSI JOURNAL, 2018, 卷号: 60
作者:  Li, Yanbin;  Tang, Ming;  Li, Yuguang;  Zhang, Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace