×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [41]
软件研究所 [3]
复旦大学上海医学院 [1]
内容类型
期刊论文 [29]
会议论文 [16]
发表日期
2019 [1]
2018 [6]
2016 [1]
2015 [3]
2014 [2]
2012 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共45条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs
期刊论文
Integration, 2019
作者:
Li, Yanbin
;
Tang, Ming
;
Li, Yuguang
;
Zhang, Huanguo
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 卷号: 37, 期号: 12
作者:
Tang Ming
;
Li Yanbin
;
Zhao Dongyan
;
Li Yuguang
;
Yan Fei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/05
dth-order masking schemes
field-programmable gate array (FPGA)
hardware implementation
practical security
side-channel attack (SCA)
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes
期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 卷号: 23, 期号: 5
作者:
Tang, Ming
;
Li, Yuguang
;
Li, Yanbin
;
Wang, Pengbo
;
Zhao, Dongyan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Side-Channel Attack (SCA)
toggle count
masking
simulation-based analysis
A generic TC-based method to find the weakness in different phases of masking schemes
期刊论文
Tsinghua Science and Technology, 2018, 卷号: 23, 期号: 5
作者:
Tang, Ming
;
Li, Yuguang
;
Li, Yanbin
;
Wang, Pengbo
;
Zhao, Dongyan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework
期刊论文
INTEGRATION-THE VLSI JOURNAL, 2018, 卷号: 60
作者:
Li, Yanbin
;
Tang, Ming
;
Li, Yuguang
;
Zhang, Huanguo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
secure masking scheme
Sensitive information reuse
Leakage of masking sequence
Side-channel attacks
Lightweight countermeasure
Leak point locating in hardware implementations of higher-order masking schemes
期刊论文
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 卷号: 37, 期号: 12
作者:
Ming, Tang
;
Yanbin, Li
;
Dongyan, Zhao
;
Yuguang, Li
;
Fei, Yan
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Leak Point Locating in Hardware Implementations of Higher-order Masking Schemes
期刊论文
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018
作者:
Ming, Tang
;
Huanguo, Zhang
;
Fei, Yan
;
Yuguang, Li
;
Dongyan, Zhao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Design and Implementation of Weibo Sentiment Analysis Based on LDA and Dependency Parsing
期刊论文
China Communications, 2016, 卷号: 13, 期号: 11
作者:
Li, Yonggan
;
Zhou, Xueguang
;
Sun, Yan
;
Zhang, Huanguo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
information security
information content security
sentiment analysis
dependency parsing
emotion tendency classification
emotion expression extraction
Research on Methods of Microblogging Sentiment Feature Extraction Based on Dependency Parsing
会议论文
作者:
Li Yonggan
;
Zhou Xueguang
;
Guo Wei
;
Zhang Huanguo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Microblogging
Dependency Parsing
Opinion Word Expansion
Sentiment Feature Extraction
On the coefficients of the polynomial in the number field sieve
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2015, 卷号: 58, 期号: 11
作者:
Yang Min
;
Meng QingShu
;
Wang ZhangYi
;
Li Li
;
Zhang HuanGuo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/05
cryptography
integer factorization
number field sieve
polynomial selection
coefficients
zero roots
complete discrimination system
©版权所有 ©2017 CSpace - Powered by
CSpace