搜索结果: 1-5 共查到“军事学 Stage”相关记录5条 . 查询时间(0.156 秒)
We introduce a new variant of decentralised, trustless, permissionless proof-of-work blockchain. The main novelty of the new variant is a multi-stage proof of work which is analogous to multi-stage pi...
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
applied cryptography public-key cryptography side-channel analysis
2018/7/9
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption. Ahead of schedule, code for this functionality was recently mainlined...
The indifferentiability framework by Maurer, Renner and Holenstein (MRH; TCC 2004) formalizes a sufficient condition to safely replace a random oracle by a construction based on a (hopefully) weaker a...
Multi-Stage Fault Attacks on Block Ciphers
lightweight block cipher Multi-Stage Fault Attack
2014/3/5
This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of block ciphers having independent subkeys. Besides the specification of an algorithm implementing the techniq...
RC4 State Information at Any Stage Reveals the Secret Key
Bias Cryptanalysis Key Scheduling
2008/8/25
A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in
this paper, where the nonlinear operation is swapping among the permutation bytes.
Explicit formulae are provided for...