Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Xuexin Zheng"'
Publikováno v:
AIP Advances, Vol 11, Iss 6, Pp 065015-065015-11 (2021)
In this paper, a method for determining the thermal conductivity of in situ formation rock, which combines experimental measurements, theoretical model predictions, and geophysical logging of formation porosity, is presented to predict the thermal co
Externí odkaz:
https://doaj.org/article/a69806ba9397462b9076c4492b3daa7d
Publikováno v:
IEEE Access, Vol 7, Pp 63217-63229 (2019)
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices. Collision attack represents
Externí odkaz:
https://doaj.org/article/5b2886cb21024834b16f51b4ee782dfb
Publikováno v:
IEEE Access, Vol 7, Pp 63217-63229 (2019)
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices. Collision attack represents
Publikováno v:
AIP Advances, Vol 11, Iss 6, Pp 065015-065015-11 (2021)
In this paper, a method for determining the thermal conductivity of in situ formation rock, which combines experimental measurements, theoretical model predictions, and geophysical logging of formation porosity, is presented to predict the thermal co
Publikováno v:
Computers & Electrical Engineering. 63:220-231
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee
Autor:
Xianmeng Meng, Xuexin Zheng
Publikováno v:
Information Processing Letters. 115:858-862
Let N = p q be an RSA modulus with balanced primes p and q. Suppose that the public exponent e and private exponent d satisfy ed - 1 = k ? ( N ) . We revisit the birthday attack against short exponent RSA proposed by Meng and Zheng at ACISP 2012. We
Publikováno v:
Science China Information Sciences. 58:1-15
Collision attack is often employed against some cryptographic algorithms such as AES and DES. As a usual countermeasure, masking can resist such attacks to some extent. In CHES 2011, Clavier et al. proposed a collision-correlation attack based on Pea
Publikováno v:
Information Processing Letters
Information Processing Letters, Elsevier, 2014, 114 (1-2), pp.9-12. ⟨10.1016/j.ipl.2013.10.004⟩
Information Processing Letters, 2014, 114 (1-2), pp.9-12. ⟨10.1016/j.ipl.2013.10.004⟩
Information Processing Letters, Elsevier, 2014, 114 (1-2), pp.9-12. ⟨10.1016/j.ipl.2013.10.004⟩
Information Processing Letters, 2014, 114 (1-2), pp.9-12. ⟨10.1016/j.ipl.2013.10.004⟩
In CRYPTO 2009, Lyubashevsky and Micciancio presented reductions BDD 1 / 2 γ (Bounded Distance Decoding Problem) ≤ uSVP γ (Unique Shortest Vector Problem) ≤ BDD 1 / γ , and posed an open problem whether the reduction gap can be closed. This pa
Publikováno v:
Microprocessors and Microsystems. 37:601-609
NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break th
Publikováno v:
Mathematical Problems in Engineering, Vol 2014 (2014)
In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during