搜索结果: 1-7 共查到“军事学 FLOW”相关记录7条 . 查询时间(0.14 秒)
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
eFPGA ASIC
2018/8/8
This work proposes the first fine-grained configurable cell array specifically tailored for cryptographic implementations. The proposed architecture can be added to future FPGAs as an application-spec...
Access Control Encryption: Enforcing Information Flow with Cryptography
public-key cryptography access control
2016/2/23
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive
that allows fine-grained access control, by giving different rights to different users not only in terms of
...
Efficient RAM and control flow in verifiable outsourced computation
implementation applications of PCPs zero knowledge
2016/1/7
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems security: allowing
a l...
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
foundations / cryptanalysis implementation AES Virtualization Side Channel Attack
2012/3/27
In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly...
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
Program Counter Security Model Automatic Detection Control-Flow Side Channel Attacks
2009/3/11
We introduce new methods for detecting control-flow side channel attacks, transforming C source
code to eliminate such attacks, and checking that the transformed code is free of control-flow side cha...
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
Two-flow Zero-Knowledge Identification Protocol
2008/12/22
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol.
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Sound Secrecy Proof Mechanized Flow Analysis
2008/12/10
We present a novel approach for proving secrecy properties of security protocols by mechanized
flow analysis. In contrast to existing tools for proving secrecy by abstract interpretation,
our tool e...