Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jin-tao RAO"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 65-72 (2017)
A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the at
Externí odkaz:
https://doaj.org/article/5c16098182b94ea28615c11698f7f3f8
Publikováno v:
Tongxin xuebao, Vol 37, Pp 98-103 (2016)
A novel method of fault attack based on round reduction against SM4 algorithm was proposed.Faults were in-jected into the last four rounds of the SM4 encryption algorithm,so that the number of the algorithm's rounds can be re-duced.In known-ciphertex
Externí odkaz:
https://doaj.org/article/1dc309c8cd0440c9a8ddacb227c99e42
Publikováno v:
Tongxin xuebao, Vol 37, Pp 57-62 (2016)
A novel method of mutual information power analysis attack was proposed.The method was built on the basis of the basic principle of power analysis and the basic theory of information.For the purpose of attacking the key,the mutual in-formation values
Externí odkaz:
https://doaj.org/article/0788429658564dbbbff269c78cf0564c
Publikováno v:
网络与信息安全学报, Vol 2, Pp 69-75 (2016)
In order to extract feature information of side channel signal from the strong noise,the approach of signal feature extraction was proposed on account of empirical mode decomposition (EMD) and difference spectrum of singular value.Firstly,using EMD t
Externí odkaz:
https://doaj.org/article/772a0ba885a845c8b15d2a6e97991618
Publikováno v:
Tongxin xuebao, Vol 37, Pp 38-43 (2016)
The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then
Externí odkaz:
https://doaj.org/article/1b0be10f543441399072214940337b19
Publikováno v:
Tongxin xuebao, Vol 36, Pp 131-135 (2015)
Based on the mutual information power analysis attack in time domain of the crypto chip,a method for analyzing the energy of the maximum mutual information coefficient in the frequency domain was proposed.This method combined the principle of passwor
Externí odkaz:
https://doaj.org/article/f2ebcb435cb149a3ba8cef5a236af661
Publikováno v:
Tongxin xuebao, Vol 36, Pp 85-91 (2015)
The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However,the attack process was complex.There were many problems in the
Externí odkaz:
https://doaj.org/article/0cb7f730ef2d492ca0a89afea260fe2c
Publikováno v:
Tongxin xuebao, Vol 36, Pp 142-148 (2015)
The method of chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data is proposed.Firstly,this method attacks out the output of the iterative function.Then the sub key can be achieved by the output of the it
Externí odkaz:
https://doaj.org/article/da9263e9e79543b18fd62e3cbf712ebd
Publikováno v:
网络与信息安全学报, Vol 2, Iss 7, Pp 69-75 (2016)
In order to extract feature information of side channel signal from the strong noise,the approach of signal feature extraction was proposed on account of empirical mode decomposition (EMD) and difference spectrum of singular value.Firstly,using EMD t
Externí odkaz:
https://doaj.org/article/0476f10d91ec458080f70a2c11e36552