搜索结果: 1-2 共查到“军事学 NI”相关记录2条 . 查询时间(0.109 秒)
In CRYPTO 1999, J. An and M. Bellare proposed a MerkleDamgⅹard
iteration based MAC construction called NI-MAC in order to
avoid constant re-keying on multiblock messages in NMAC and to ease
the sec...
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
foundations / cryptanalysis implementation AES Virtualization Side Channel Attack
2012/3/27
In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly...