Zobrazeno 1 - 10
of 359
pro vyhledávání: '"Dawu GU"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to
Externí odkaz:
https://doaj.org/article/db82109a9e4149ff8eb63232248a3e81
Publikováno v:
Tongxin xuebao, Vol 45, Pp 141-151 (2024)
To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers wer
Externí odkaz:
https://doaj.org/article/824d7a8586d94c508bab2b0e09157aee
Publikováno v:
Tongxin xuebao, Vol 44, Pp 167-175 (2023)
On the random single byte-oriented fault model and the assumption of ciphertext-only attack, a statistical ineffective fault analysis of the Saturnin-Short cipher was proposed.The analysis combined the statistical distribution with the ineffective an
Externí odkaz:
https://doaj.org/article/1e7d9bab794042acb3f0a7fc63d45f41
Publikováno v:
Tongxin xuebao, Vol 42, Pp 135-149 (2021)
The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parz
Externí odkaz:
https://doaj.org/article/9392c486e6d5450b9a9aeee3c135032a
Publikováno v:
网络与信息安全学报, Vol 6, Pp 137-151 (2020)
Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card be
Externí odkaz:
https://doaj.org/article/bde0ea2bbde445d096986d4465f40d44
Publikováno v:
IEEE Access, Vol 8, Pp 8361-8370 (2020)
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future. It adopts a three-round Even-Mansour scheme and supports 64 and 128 bits of block size, denoted
Externí odkaz:
https://doaj.org/article/48db38cd529b49b3b77b209e27e563a8
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar
Externí odkaz:
https://doaj.org/article/1bd05dc6b9584be89151d316fa1383e8
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
With the renaissance of deep learning, the side-channel community also notices the potential of this technology, which is highly related to the profiling attacks in the side-channel context. Many papers have recently investigated the abilities of dee
Externí odkaz:
https://doaj.org/article/a9a9a68b4f444cfda77b051d026e78ce
Autor:
Wei LI, Yixin WU, Dawu GU, Jiayao LI, Shan CAO, Menglin WANG, Tianpei CAI, Xiangwu DING, Zhiqiang LIU
Publikováno v:
Tongxin xuebao, Vol 40, Pp 122-137 (2019)
The ciphertext-only fault analysis on the SIMON cipher was proposed by injecting a random nibble fault under the random nibble fault model.After injecting faults,every faulty ciphertext could be decrypted and the statistical distribution of all inter
Externí odkaz:
https://doaj.org/article/bd43cd54e0fa4b42adcd309792b94ab0
Publikováno v:
Tongxin xuebao, Vol 40, Pp 71-82 (2019)
With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a th
Externí odkaz:
https://doaj.org/article/be35648d2a214c36a34fce7d676dc2de