搜索结果: 1-15 共查到“密码学 protection”相关记录29条 . 查询时间(0.14 秒)
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Compromised Platforms control systems
<
2019/7/31
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
CRAFT block cipher tweakable
<
2019/2/28
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
(R)CCA Secure Updatable Encryption with Integrity Protection
updatable encryption integrity, key rotation ciphertext-independence
<
2019/2/28
An updatable encryption scheme allows a data host to update ciphertexts of a client from an old to a new key, given so-called update tokens from the client. Rotation of the encryption key is a common ...
nQUIC: Noise-Based QUIC Packet Protection
UDP QUIC SSL
<
2019/1/16
We present nQUIC, a variant of QUIC-TLS that uses the Noise protocol framework for its key exchange and basis of its packet protector with no semantic transport changes. nQUIC is designed for deployme...
Automated software protection for the masses against side-channel attacks
Side-channel attack hiding polymorphism
<
2018/12/19
We present an approach and a tool to answer the need for effective, generic and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so t...
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
<
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
<
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models
MLP CNNs
<
2018/4/4
This paper proposes DeepSigns, a novel end-to-end framework for systematic Watermarking and Intellectual Property (IP) protection in the context of deep learning. DeepSigns, for the first time, introd...
IntegriKey: End-to-End Integrity Protection of User Input
End-to-End Integrity Protection User Input
<
2018/1/2
Networked critical systems, such as Programmable Logic Controllers in a factory plant, are often remotely configurable by administrators through web-based interfaces. However, administrative host mach...
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
AES side-channel attacks polymorphism
<
2017/7/24
We present a generic framework for runtime code polymorphism, applicable to a broad range of computing platforms including embedded systems with low computing resources (e.g. microcontrollers with few...
Error-free protection of EC point multiplication by modular extension
elliptic curve point multiplication modulus extension
<
2017/2/28
An implementation of a point multiplication function in an elliptic-curve cryptosystem can be attacked by fault injections in order to reveal the secret multiplier. A special kind of such an attack is...
ROTE: Rollback Protection for Trusted Execution
SGX Rollback protection Distributed system
<
2017/2/20
Intel SGX isolates the runtime memory of protected applications (enclaves) from the OS and allows enclaves to encrypt and authenticate (seal) data for persistent storage. Sealing prevents an untrusted...
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Side-Channel Analsysi Masking Threshold Implementation
<
2016/5/24
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are d...
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
masking domain-oriented masking threshold implementations
<
2016/5/24
Passive physical attacks, like power analysis, pose a serious threat to the security of embedded systems and corresponding countermeasures need to be implemented. In this work, we demonstrate how the ...
Privacy protection in electronic education based on polymorphic pseudonymization
e-textbooks homomorphic encryption pseudonyms
<
2016/1/26
In [13.] Dutch government proposes an identity scheme supporting personal data exchange of pupils with private e-textbook publishers. This design propagates sharing personal numbers of pupils among pr...