搜索筛选:
搜索耗时0.5289秒,为你在为你在102,267,441篇论文里面共找到 18 篇相符的论文内容
类      型:
[期刊论文] 作者:WEN Hailong,GU Dawu, 来源:通讯和计算机:中英文版 年份:2005
[期刊论文] 作者:LI Wei,GU Dawu, 来源:武汉大学学报:自然科学英文版 年份:2006
预定攻击由时间测量打破一个秘密成员系统恢复钥匙。最可得到的反措施基于模块的安全保护块零。这篇论文给预定攻击的一个完全的定义;学习操作的危险;模块 on timing 攻击。我...
[期刊论文] 作者:LIU Junrong,GUO Zheng,GU Dawu,, 来源:中国通信:英文版 年份:2015
In this paper,we propose a hybrid power model that includes the power consumption of not only the registers but also part of the combinational logic.By doing kn...
[期刊论文] 作者:Liu Feifei,Gu Dawu,Lu Haining,, 来源:中国通信 年份:2011
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the...
[期刊论文] 作者:Wang Yong,Gu Dawu,Xu Jianping,, 来源:中国通信 年份:2010
[期刊论文] 作者:Ding Ning Gu Dawu Liu Zhiqiang, 来源:中国通信 年份:2010
[期刊论文] 作者:Li Juanru Gu Dawu Deng Chaoguo, 来源:中国通信 年份:2010
[期刊论文] 作者:GUO Zheng,GU Dawu,LU Haining,L, 来源:中国通信:英文版 年份:2015
Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This pap...
[期刊论文] 作者:LI Wei,TAO Zhi,GU Dawu,SUN Li,, 来源:中国通信:英文版 年份:2014
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to...
[期刊论文] 作者:GUO Zheng,GU Dawu,YUAN Kan,LIU J, 来源:Chinese Journal of Electronics 年份:2020
[会议论文] 作者:Haihua Gu,Dawu Gu,Wenlu Xie,Ray C.C.Cheung, 来源:中国密码学会2013年密码芯片学术会议 年份:2013
The extensive set of physical attack techniques implies to a clear threat to devices that execute cryptography.A fault attack actively influences exe cution and hopes to retrieve information from unin...
[期刊论文] 作者:GU Dawu,JIANG Xuxian,XUE Yibo,ZOU Wei,Guo Li, 来源:中国通信 年份:2014
Our world becomes more and more dependent on communications infrastructure such as computer resources,network connections and devices for communications.However...
[会议论文] 作者:Zhao Jianjie,赵建杰,Gu Dawu,谷大武, 来源:中国密码学会2009年会 年份:2009
  如何构造安全的密钥协商协议是信息安全领域富有挑战性的问题之一。然而目前多数安全协议只能达到“启发式”安全,协议的安全性假设和效率也不够理想。针对这些问题,本文...
[期刊论文] 作者:GUO Zheng,GU Dawu,YUAN Kan,LIU Junrong,HE Yuming,, 来源:Chinese Journal of Electronics 年份:2014
In this paper, we propose a method that builds power model template according to input transitions of combinatorial logic circuit. By computing its correlation...
[期刊论文] 作者:LIU Junrong,GUO Zheng,GU Dawu,YU Yu,LU Haining,GU Haihua,BAO Sigang,, 来源:中国通信 年份:2015
In this paper,we propose a hybrid power model that includes the power consumption of not only the registers but also part of the combinational logic.By doing kn...
[期刊论文] 作者:GUO Zheng,GU Dawu,LU Haining,LIU Junrong,XU Sen,BAO Sigang,GU Haihua,, 来源:中国通信 年份:2015
Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This pap...
[期刊论文] 作者:LI Wei,TAO Zhi,GU Dawu,SUN Li,QU Bo,LIU Zhiqiang,LIU Ya,, 来源:中国通信 年份:2014
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to...
[期刊论文] 作者:Sen Xu,Xiangjun Lu,Aidong Chen,Haifeng Zhang,Haihua Gu,Dawu Gu,Kaiyu Zhang,Zheng Guo,Junrong Liu, 来源:中国通信(英文版) 年份:2018
Public key cryptographic (PKC) algorithms,such as the RSA,elliptic curve digital signature algorithm (ECDSA) etc.,are widely used in the secure communication sy...
相关搜索: