搜索结果: 1-3 共查到“Compromising”相关记录3条 . 查询时间(0.074 秒)
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Branch misprediction HPC public-key cipher, side-channel
2015/12/29
Asymmetric-key cryptographic algorithms when implemented on systems with branch predictors, are subjected to side-channel attacks exploiting the deterministic branch predictor behavior due to their ke...
This paper presents an alternative approach for achieving higher optical efficiency in conventional parallax barrier 3D mobile displays. The method entails modifying and enhancing the protrusion struc...
From Dolev-Yao to Strong Adaptive Corruption:Analyzing Security in the Presence of Compromising Adversaries
Dolev-Yao Strong Adaptive Corruption hierarchy of adversary models
2009/6/11
We formalize a hierarchy of adversary models for security
protocol analysis, ranging from a Dolev-Yao style adversary
to more powerful adversaries who can reveal different parts
of principals’ stat...