CORC

浏览/检索结果: 共55条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:  Cui, Aijiao;  Li, Mengyang;  Qu, Gang;  Li, Huawei
收藏  |  浏览/下载:14/0  |  提交时间:2021/12/01
Fault Attack on ACORN v3 期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
收藏  |  浏览/下载:29/0  |  提交时间:2018/09/08
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 12
作者:  Tang Ming;  Wang Pengbo;  Ma Xiaoqi;  Chang Wenjie;  Zhang Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 卷号: 37, 期号: 12
作者:  Tang Ming;  Li Yanbin;  Zhao Dongyan;  Li Yuguang;  Yan Fei
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 卷号: 23, 期号: 5
作者:  Tang, Ming;  Li, Yuguang;  Li, Yanbin;  Wang, Pengbo;  Zhao, Dongyan
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Side-Channel Attacks in a Real Scenario 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 卷号: 23, 期号: 5
作者:  Tang, Ming;  Luo, Maixing;  Zhou, Junfeng;  Yang, Zhen;  Guo, Zhipeng
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/05
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference 期刊论文
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018
作者:  Tang, Benxiao;  Wang, Zhibo;  Wang, Run;  Zhao, Lei;  Wang, Lina
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
A Novel Stealthy Attack to Gather SDN Configuration-Information 期刊论文
IEEE Transactions on Emerging Topics in Computing, 2018, 页码: 1
作者:  FabioDeGaspari;  MauroConti;  LuigiVincenzoMancini
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/24
A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. 期刊论文
SENSORS, 2018, 卷号: Vol.18 No.2
作者:  Cao, Y;  Zhao, XJ;  Ye, WB;  Han, QB;  Pan, XF
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26
Cache Attack on AES for Android Smartphone 会议论文
ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018-01-01
作者:  Li, Bo;  Jiang, Bo
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace