中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
机构
采集方式
内容类型
发表日期
学科主题
筛选

浏览/检索结果: 共31条,第1-10条 帮助

条数/页: 排序方式:
Making Information Hiding Effective Again 期刊论文  OAI收割
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  
Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung
  |  收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
An Efficient Full Hardware Implementation of Extended Merkle Signature Scheme 期刊论文  OAI收割
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 页码: 12
作者:  
Cao, Yuan;  Wu, Yanze;  Wang, Wen;  Lu, Xu;  Chen, Shuai
  |  收藏  |  浏览/下载:36/0  |  提交时间:2022/06/21
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks 期刊论文  OAI收割
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:  
Zhao, Lutan;  Li, Peinan;  Hou, Rui;  Huang, Michael C.;  Liu, Peng
  |  收藏  |  浏览/下载:69/0  |  提交时间:2021/12/01
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash 期刊论文  OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:  
Cui, Aijiao;  Li, Mengyang;  Qu, Gang;  Li, Huawei
  |  收藏  |  浏览/下载:19/0  |  提交时间:2021/12/01
Fault Attack on ACORN v3 期刊论文  OAI收割
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:  
Zhang, Xiaojuan
  |  收藏  |  浏览/下载:29/0  |  提交时间:2018/09/08
对ECC算法实现的选择明文攻击方法 期刊论文  OAI收割
通信学报, 2014, 卷号: 35, 期号: 5, 页码: 79-87
罗鹏; 李慧云; 王鲲鹏; 王亚伟
  |  收藏  |  浏览/下载:11/0  |  提交时间:2014/12/16
Two-way deterministic quantum key distribution against detector-side-channel attacks 期刊论文  OAI收割
PHYSICAL REVIEW A, 2013, 卷号: 88, 期号: 4
作者:  
Lu, Hua;  Fung, Chi-Hang Fred;  Cai, Qing-yu
收藏  |  浏览/下载:19/0  |  提交时间:2015/06/23
cube cryptanalysis of lblock with noisy leakage 会议论文  OAI收割
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai
  |  收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems 期刊论文  OAI收割
SECURITY AND COMMUNICATION NETWORKS, 2012
作者:  
Keke Wu;  Huiyun Li;  Dingju Zhu
收藏  |  浏览/下载:8/0  |  提交时间:2015/08/25
Side channel analysis attacks against channel state information based key generation 会议论文  OAI收割
2012 International Conference on Systems and Informatics, ICSAI 2012, 中国
作者:  
Liying Xiong;  Huiyun Li
收藏  |  浏览/下载:9/0  |  提交时间:2015/08/25