搜索结果: 1-13 共查到“军事学 experimental”相关记录13条 . 查询时间(0.156 秒)
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
fault attack neural network deep learning
2019/5/13
Deep learning is becoming a basis of decision making systems in many application domains, such as autonomous vehicles, health systems, etc., where the risk of misclassification can lead to serious con...
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Side channel deep dearning template attack
2018/12/24
This study compares the experimental results of Template Attacks (TA) and Deep Learning (DL) techniques called Multi Layer Perceptron (MLP) and Convolutional Neural Network (CNN), concurrently in fron...
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
WSN lightweight block cipher DDT
2016/12/12
In this paper, we analyzed an extreme case of lightweight block cipher design in terms of security and efficiency. To do this, we proposed ELiF block cipher family which has one of the smallest hardwa...
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
foundations pseudorandomness
2016/1/26
Random numbers have been one of the most useful objects in statistics, computer science, cryptography, modeling, simulation, and other applications though it is very dicult to construct true randomne...
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Shor's factoring algorithm quantum modular exponentiation superposition
2016/1/6
An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., ...
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Experimental Results cryptographic protocols
2016/1/6
This paper describes techniques that enable vehicles to collect local information (such as road conditions
and traffic information) and report it via road-to-vehicle communications. To exclude malici...
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
power analysis attack LEA ARX
2016/1/5
The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for s...
Experimental Study of DIGIPASS GO3 and the Security of Authentication
cryptographic protocols authentication codes
2015/12/29
Based on the analysis of 6-digit one-time passwords(OTP) generated by DIGIPASS
GO3 we were able to reconstruct the synchronisation system of the token, the OTP
generating algorithm and the verificat...
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gr鯾ner Basis Methods -- an Experimental Study
public-key cryptography Elliptic curve discrete logarithm problem
2014/3/8
At ASIACRYPT 2012, Petit and Quisquater suggested that there may be a subexponential-time index-calculus type algorithm for the Elliptic Curve Discrete Logarithm Problem (ECDLP) in characteristic two ...
Spectral Coherence Analysis - First Experimental Results
Coherence Analysis SCAN Side Channel Analysis
2012/3/29
This paper introduces a new family of distinguishers for side channel analysis, based on the spectral coherence between leakage traces. Its main goal is to allow adversaries and evaluators of cryptogr...
Spectral Coherence Analysis - First Experimental Results -
Coherence Analysis SCAN Side Channel Analysis
2011/2/23
This paper introduces a new family of distinguishers for side channel analysis, based on the spectral coherence between leakage traces. Its main goal is to allow adversaries and evaluators of cryptogr...
The output of RC4 was analyzed using the ”book stack” test for randomness
from [7]. It is experimentally shown that the keystream generated from RC4
can be distinguished from random with about 232 o...
We present an experimental block cipher, ConSum, based on a hitherto
unstudied design element: the Conway transformation. ConSum features an
extremely simple design and the ability to operate with a...