搜索结果: 1-8 共查到“军事学 Reconfigurable Hardware”相关记录8条 . 查询时间(0.093 秒)
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
side-channel protection TI FPGA
2016/12/7
First-order secure Threshold Implementations (TI) of symmetric
cryptosystems provide provable security at a moderate overhead;
yet attacks using higher-order statistical moments are still feasible. ...
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Ideal Lattices Gaussian Sampling Digital Signatures
2016/1/23
The recent Bimodal Lattice Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. It offers small signatures of 5600 bits for a 128-bi...
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
side-channel protection FPGA masking
2016/1/3
Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of first-order side-channel protection for cryptographic primitives at the cost of a significant reconfiguration...
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Homomorphic encryption ring learning with errors FPGA
2015/12/29
Homomorphic encryption allows computation on encrypted data and makes it possible
to securely outsource computational tasks to untrusted environments. However, all proposed
schemes are quite ineffic...
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
crypto engine SIMON FPGA
2015/12/24
There is a significant effort in building lightweight cryptographic
operations, yet the proposed solutions are typically singlepurpose
modules that can implement a single functionality. In contrast,...
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
secret-key cryptography / Grain-128 stream cipher cryptanalysis cube attacks cube testers RIVYERA experimental verification
2012/3/28
In this paper we describe the first single-key attack which can break the full version of Grain-128 for arbitrary keys by an algorithm which is considerably faster than exhaustive search (by a factor ...
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
Grain-128 stream cipher cryptanalysis cube attacks cube testers RIVYERA experimental verification
2011/6/9
In this paper we describe the first single-key attack which can break the full version of Grain-128 for arbitrary keys by an algorithm which is considerably faster than exhaustive search (by a factor ...
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Reconfigurable Hardware Tweakable Enciphering Schemes
2008/5/22
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can be used as the main bu...