Zobrazeno 1 - 10
of 438
pro vyhledávání: '"DENGGUO FENG"'
Publikováno v:
IET Communications, Vol 18, Iss 9, Pp 535-556 (2024)
Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent. Confidential computing emerges as a crucial securit
Externí odkaz:
https://doaj.org/article/3330ce54438545c2890f9cc3613d0f95
Autor:
Zhaocun ZHOU, Dengguo FENG
Publikováno v:
Tongxin xuebao, Vol 43, Pp 183-198 (2022)
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techni
Externí odkaz:
https://doaj.org/article/edb2ceecb1884e6cbadcaa79919f8eac
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 4 (2022)
FRIET is a duplex-based authenticated encryption scheme proposed at EUROCRYPT 2020. It follows a novel design approach for built-in countermeasures against fault attacks. By a judicious choice of components, the designers propose the permutation FRIE
Externí odkaz:
https://doaj.org/article/0ef57e7c342a4a5d8741cbf6e5b60982
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 2 (2022)
Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via
Externí odkaz:
https://doaj.org/article/1243f3772d2847b59fa53f00fcbe7fef
Autor:
Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the appli
Publikováno v:
IEEE Transactions on Services Computing. 16:913-926
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-15
Publikováno v:
Designs, Codes and Cryptography. 90:2449-2479
Publikováno v:
ACM Transactions on Embedded Computing Systems; Nov2023, Vol. 22 Issue 6, p1-22, 22p
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-17