Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
Provably secure higher-order masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …
(SCA). To counteract it, masking schemes are usually involved which randomize key …
Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …
and other components. As a result, measurements of the power used by actual computers or …
Masking against side-channel attacks: A formal security proof
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
Exploring security vulnerabilities of unmanned aerial vehicles
We are currently observing a significant increase in the popularity of Unmanned Aerial
Vehicles (UAVs), popularly also known by their generic term drones. This is not only the …
Vehicles (UAVs), popularly also known by their generic term drones. This is not only the …
A leakage-resilient mode of operation
K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …
than–a pseudorandom function: for wPRFs one only requires that the output is …
Hardware security: Threat models and metrics
The globalized semiconductor supply chain is vulnerable to hardware attacks including:
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices
The market for RFID technology has grown rapidly over the past few years. Going along with
the proliferation of RFID technology is an increasing demand for secure and privacy …
the proliferation of RFID technology is an increasing demand for secure and privacy …
Security through amnesia: a software-based solution to the cold boot attack on disk encryption
P Simmons - Proceedings of the 27th Annual Computer Security …, 2011 - dl.acm.org
Disk encryption has become an important security measure for a multitude of clients,
including governments, corporations, activists, security-conscious professionals, and privacy …
including governments, corporations, activists, security-conscious professionals, and privacy …