您要查找的是不是:
- The random order execution which used in cryptographic ICs is a kind of few redundancy and low power countermeasures against power analysis attacks. 乱序执行是密码芯片设计中一种低冗余、低功耗的抵抗功耗分析攻击的方法。
- Modeling Timing Randomization in Cryptographic Chip Against Power Analysis Attack 基于时间随机化的密码芯片防攻击方法
- Against power analysis attack 抗功耗攻击
- Research on Method of Power Analysis Attack Against Smart-card 对智能卡进行简易功率分析攻击的方法研究
- Under a simple power leakage model based on Hamming weight,we find some operation in SMS4 algorithm will leaks information about secret key which is vulnerable to differential Power Analysis attack. 在基于汉明重量的简单能量泄露模型下,我们发现SMS4算法中某些操作会泄露出密钥信息,从而容易受到差分能量分析攻击。
- Study of Power Analysis Attack to ECC in ASIC Chip ECC专用密码芯片的功耗分析研究
- This paper firstly shows the vulnerability for power analysis attacks of straightforward AES then simulates DPA attack of original AES algorithm and modified AES algorithm on the virtual smartcard respectively, finally analyse the results. 分析了高级加密标准(AES)算法易于受到DPA攻击的环节,使用PINPAS工具分别对采用原始AES算法和改进AES算法的仿真智能卡做了DPA攻击测试,并分析了其测试结果。
- Dual-Field Elliptic Curve Cryptography Processor with Countermeasures Against Power Analysis 具有防御功耗攻击性能的双域椭圆曲线密码处理器设计
- Semi-custom Design Flow: Protecting Security IC's Against Power Analysis Based on Dynamic Dual-rail Logic 基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程
- In spited of against power from inside and outside of empire. 不顾国内、国外反对势力的抗衡。
- power analysis attack 功耗攻击
- To protect modular exponentiation against simple and differential power analysis,a new method is presented. 提出了一种基于细粒度任务调度的防功耗分析(包括简单和差分功耗分析)模幂实现方法。
- T hanks to the rod is stiff enough, the fish relaxed against power gradually after a period of time. 还好钓竿的腰力颇佳,在一段时间的坚持后,鱼儿渐渐地失去抵抗的力量。
- As Mr Kundera himself has written so eloquently, “the struggle of man against power is the struggle of memory against forgetting. 昆德拉自己在作品中也令人信服地写到“人在权力中的挣扎就是记忆与忘却的挣扎”。
- Many previously published protocols for providing node privacy still leak information about the communication entities and the route by traffic analysis attack. 许多已发表的匿名通讯协定仍会因为网路流量分析攻击而洩露节点与路由路径相关之讯息。
- We are also involved in patent infringement litigation against Power Integrations in U.S. District courts in Delaware and Texas, as a defendant and as a plaintiff, respectively. 我们也涉及在美国特拉华州和德州地方法院与。
- High resolring power analysis of ions trapped in penning ion trap[J].Chinese Journal of Atomic and Molecular Physics,2003,20(2):153. Penning阱存储离子的高分辨分析[J].;原子与分子物理学报;2003;20(2):153
- You have seen enough rune covered rocks to know that the fist sized stone recovered from the lich will protect you against powerful spells of warding. 由于对于鉴赏其上镌刻了符文的石头你已经算是相当有经验了,因此你能够知道这块拳头大小、来自于巫妖身上的石头,能够提高你对于强力守护法术的抵抗性。
- It is a book with secrets.It describes He Youli, a senior high school student, who waged imaginative struggles and resistance against powerful Han Han. 本书是一部有著秘密的书,它记述了高中学生何有力与强大的韩韩在意想中进行的争斗和反抗。
- Buying a house is the best hedge against inflation. 购买房子是防止通货膨胀的最佳保障。
