×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [5]
西安交通大学 [4]
北京大学 [2]
上海电子信息职业技术... [2]
武汉大学 [2]
计算技术研究所 [1]
更多...
内容类型
期刊论文 [12]
会议论文 [4]
其他 [1]
发表日期
2020 [1]
2019 [1]
2018 [2]
2017 [4]
2015 [1]
2014 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
JOURNAL OF SUPERCOMPUTING, 2019, 卷号: 75, 期号: 6, 页码: 3099-3122
作者:
Hu, Chengyu
;
Yang, Rupeng
;
Liu, Pengtao
;
Li, Tong
;
Kong, Fanyu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Public-key encryption
Side-channel attacks
Tampering resilience
Leakage resilience
Continuous attacks
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework
期刊论文
INTEGRATION-THE VLSI JOURNAL, 2018, 卷号: 60
作者:
Li, Yanbin
;
Tang, Ming
;
Li, Yuguang
;
Zhang, Huanguo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
secure masking scheme
Sensitive information reuse
Leakage of masking sequence
Side-channel attacks
Lightweight countermeasure
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
Journal of Supercomputing, 2018
作者:
Hu C.
;
Yang R.
;
Liu P.
;
Li T.
;
Kong F.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
Continuous attacks
Leakage resilience
Public-key encryption
Side-channel attacks
Tampering resilience
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 卷号: 93, 页码: 259-279
作者:
Anwar, Shahid
;
Inayat, Zakira
;
Zolkipli, Mohamad Fadli
;
Zain, Jasni Mohamad
;
Gani, Abdullah
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/26
Countermeasures
Cloud computing
Cache-based Side channel attacks
Cross-TM Cache-based side channel attacks
Dual-Voltage Single-Rail Dynamic DPA-Resistant Logic Based on Charge Sharing Mechanism
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2017
Tang Wenyi
;
Jia Song
;
Wang Yuan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
DPA
Charge sharing
Three-phase logic family
Side-channel attacks
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model
期刊论文
IEEE ACCESS, 2017, 卷号: 5
作者:
Ruan, Ou
;
Chen, Jing
;
Zhang, Mingwu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Leakage-resilience
password-based authenticated key exchange
side-channel attacks
trusted computing
internet of things
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application
期刊论文
International Journal of High Performance Computing and Networking, 2017, 卷号: 10, 期号: 3, 页码: 226-239
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Guo, Shanqing
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/12
AHIBE
Anonymous hierarchical identity-based encryption
Leakage-resilient
Multi-keyword ranked search
Side-channel attacks
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
期刊论文
International Journal of Embedded Systems, 2015, 卷号: 7, 期号: 43163, 页码: 216-229
作者:
Hu, Chengyu
;
Yu, Zuoxia
;
Yang, Rupeng
;
Xu, Qiuliang
;
Zhou, Yongbin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Extractable hash proof system
Key encapsulation
Side-channel attacks
Weak leakage-resilient
Detecting Cache-Based Side Channel Attacks in the Cloud: An Approach with Cascade Detection Mode
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2014, 卷号: 15, 期号: [db:dc_citation_issue], 页码: 903-915
作者:
Yu, Si
;
Gui, Xiaolin
;
Zhang, Xuejun
;
Lin, Jiancai
;
Dai, Min
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/03
Information security
Cloud computing
Side channel attacks
Virtualization
Attack detection
©版权所有 ©2017 CSpace - Powered by
CSpace