搜索结果: 1-10 共查到“军事学 Theory and Practice”相关记录10条 . 查询时间(0.312 秒)
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Machine Learning Robustness Analysis Supervised Learning
2018/11/21
Profiled side-channel attacks are the most powerful attacks and they consist of two steps. The adversary first builds a leakage model, using a device similar to the target one, then it exploits this l...
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Fuzzy Extractor Physical Unclonable Functions Implementation Attacks
2017/6/2
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. Originally, biometrics were the main motivation for fuzzy extractors but ...
A First DFA on PRIDE: from Theory to Practice (extended version)
implementation cryptanalysis
2017/2/20
PRIDE is one of the most effcient lightweight block cipher proposed so far for connected objects with high performance and low resource constraints. In this paper we describe the first ever complete D...
Full Disk Encryption: Bridging Theory and Practice
disk encryption theory full disk encryption FDE
2016/12/7
We revisit the problem of Full Disk Encryption (FDE), which
refers to the encryption of each sector of a disk volume. In the context
of FDE, it is assumed that there is no space to store additional ...
Encryption and compression are frequently used together in both network and storage systems,
for example in TLS. Despite often being used together, there has not been a formal
framework for analyzin...
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
leakage resilient LPN
2015/12/31
Information leakage is a major concern in modern day IT-security. In fact, a malicious
user is often able to extract information about private values from the computation
performed on the devices. I...
Multiple Differential Cryptanalysis: Theory and Practice (Corrected)
secret-key cryptography / iterative block cipher multiple differential cryptanalysis PRESENT data complexity success probability time complexity
2012/3/29
Differential cryptanalysis is a well-known statistical attack on block ciphers. We present here a generalisation of this attack called multiple differential cryptanalysis. We study the data complexity...
Multiple Differential Cryptanalysis: Theory and Practice
iterative block cipher multiple dierential cryptanalysis PRESENT data complexitysuccess probability time complexity
2011/3/11
Dierential cryptanalysis is a well-known statistical attack on block ciphers.
We present here a generalisation of this attack called multiple dierential cryptanalysis. We
study the data complexity...
On the Theory and Practice of Personal Digital Signatures
Personal Digital Signatures issuing digital signatures key-logging
2009/6/12
We take a step towards a more realistic modeling of personal
digital signatures, where a human user, his mobile equipment, his PC and
a server are all considered as independent players in the protoc...
Cryptography in Theory and Practice: The Case of Encryption in IPsec?
IPsec integrity encryption ESP
2009/3/17
This paper studies the gaps that exist between cryptography as studied in the-
ory, as defined in standards, as implemented by software engineers, and as actually consumed
by users. Our focus is on ...