Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Guoshuang Zhang"'
Publikováno v:
Frontiers in Psychiatry, Vol 13 (2022)
BackgroundThe number of people with mental disorders is increasing in China, but there are few studies on the temporal trends and population distribution of mental disorder mortality.MethodsThe mortality of mental disorders were derived from the Chin
Externí odkaz:
https://doaj.org/article/0c449f611f1f4992af7341378d0c5ea0
Publikováno v:
Tongxin xuebao, Vol 41, Pp 11-21 (2020)
Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2122.5c,where c was the
Externí odkaz:
https://doaj.org/article/e7203dee8a0b4db0950b79352d172432
Publikováno v:
IEEE Access, Vol 7, Pp 63217-63229 (2019)
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices. Collision attack represents
Externí odkaz:
https://doaj.org/article/5b2886cb21024834b16f51b4ee782dfb
Autor:
Rixin Xu, Liehuang Zhu, An Wang, Xiaojiang Du, Kim-Kwang Raymond Choo, Guoshuang Zhang, Keke Gai
Publikováno v:
IEEE Access, Vol 6, Pp 58395-58404 (2018)
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. Fi
Externí odkaz:
https://doaj.org/article/2860075af09f4910a99a292cde15a6c1
Publikováno v:
Advances in Mathematics of Communications. 15:155-165
In this paper, we give some properties of the cycle decomposition of a nonlinear feedback shift register called WG-NLFSR which was presented by Mandal and Gong recently. First we give the parity of the state transition transformation of WG-NLFSR and
Publikováno v:
Information Sciences. 540:292-307
Hardware Trojan detection has been becoming an attentive research subject since the first Trojan in real-world hardware was found. A common way to activate a hardware Trojan is to send a command, and detecting those command-activated Trojan is one of
Publikováno v:
Future Generation Computer Systems. 106:34-42
Correlation power analysis (CPA) is known as a powerful method used to launch side-channel attacks on cryptographic devices. In the classic approach, the key is recovered word by word, whose length is usually determined by S-box. For parallel hardwar
Publikováno v:
IEEE Access, Vol 7, Pp 63217-63229 (2019)
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices. Collision attack represents
Autor:
Guoshuang Zhang, Keke Gai, An Wang, Rixin Xu, Liehuang Zhu, Xiaojiang Du, Kim-Kwang Raymond Choo
Publikováno v:
IEEE Access, Vol 6, Pp 58395-58404 (2018)
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. Fi
Publikováno v:
Computers & Electrical Engineering. 63:220-231
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee