CORC

浏览/检索结果: 共19条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks 会议论文
ISCC 2017-the 5th International Conference on Information Science and Cloud Computing, 中国广东广州, 2017-12-16
作者:  Yi Zou;  Lang Li
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/24
Stability analysis of networked control systems with denial-of-service attacks 会议论文
11th UKACC International Conference on Control (UKACC Control), 2016-08-31
作者:  Zhang, Jin[1];  Peng, Chen[2];  Masroor, Suhaib[3];  Sun, Hongtao[4];  Chai, Lin[5]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/26
Modbus/TCP communication anomaly detection based on PSO-SVM 会议论文
2013 2nd International Conference on Mechanical Design and Power Engineering, ICMDPE 2013, Beijing, China, November 29-30, 2013
作者:  Shang WL(尚文利);  Zhang SS(张盛山);  Wan M(万明)
收藏  |  浏览/下载:9/0  |  提交时间:2014/04/16
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations 会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo; Zhou Yongbin; Liu Jiye; Chen Danyang
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
an efficient leakage characterization method for profiled power analysis attacks 会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong; Zhou Yongbin; Feng Dengguo
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
Simple power analysis attacks using chosen message against ECC hardware implementations 会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom
作者:  Huiyun Li;  keke Wu;  Guoqing Xu;  Hai Yuan;  Peng Luo
收藏  |  浏览/下载:13/0  |  提交时间:2015/08/25
simple power analysis attacks using chosen message against ecc hardware implementations 会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun; Wu Keke; Xu Guoqing; Yuan Hai; Luo Peng
收藏  |  浏览/下载:22/0  |  提交时间:2011/10/10
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks 会议论文
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang; Zhou Yongbin; Liu Jiye; Zhang Hailong
收藏  |  浏览/下载:7/0  |  提交时间:2011/10/10
how to characterize side-channel leakages more accurately? 会议论文
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
收藏  |  浏览/下载:9/0  |  提交时间:2011/10/10
The impact of the clock frequency on the power analysis attacks 会议论文
2011 International Conference on Internet Technology and Applications, iTAP 2011, August 16, 2011 - August 18, 2011
作者:  Du, Zhi-Bo;  Chen, Yun;  Chen, Ai-Dong
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace