Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Congming Wei"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
In side-channel analysis of public-key algorithms, we usually classify operations based on the differences in power traces produced by different basic operations (such as modular square or modular multiplication) to recover secret information like pr
Externí odkaz:
https://doaj.org/article/730692a7ead94d89bb7d89f05ed9e2d5
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031281235
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b38827c6abb34c9f5aa87a122e340013
https://doi.org/10.1007/978-3-031-28124-2_34
https://doi.org/10.1007/978-3-031-28124-2_34
Publikováno v:
The Computer Journal.
At FSE 2008, Leurent introduced the preimage attack on MD4 by exploiting differential trails. In this paper, we apply the differential-aided preimage attack to Keccak with the message modification techniques. Instead of directly finding the preimage,
Publikováno v:
IET Information Security. 14:483-492
This study revisits the side-channel security of the elliptic curve cryptography (ECC) scalar multiplication implemented with Montgomery ladder. Focusing on a specific implementation that does not use the y-coordinate for point addition (ECADD) and p
Publikováno v:
Information Security and Cryptology – ICISC 2021 ISBN: 9783031088957
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ceddf2084852a9fc08e9395971f60616
https://doi.org/10.1007/978-3-031-08896-4_10
https://doi.org/10.1007/978-3-031-08896-4_10
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920616
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9b4f7d6a0f839b15af06394de4991505
https://doi.org/10.1007/978-3-030-92062-3_9
https://doi.org/10.1007/978-3-030-92062-3_9
Publikováno v:
Energy Science and Applied Technology: Proceedings of the 2nd International Conference on Energy Science and Applied Technology (ESAT 2015)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ae60b9005197758bb81590ee04be121
https://doi.org/10.1201/b19779-115
https://doi.org/10.1201/b19779-115
Publikováno v:
2009 5th International Conference on Wireless Communications, Networking & Mobile Computing; 2009, p1-4, 4p