中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-8 of 8)

Items/Page:    Sort:
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo; Zhou Yongbin; Liu Jiye; Chen Danyang

 
generic side-channel distinguisher based on kolmogorov-smirnov test: explicit construction and practical evaluation [期刊论文]
Chinese Journal of Electronics, 2012-01-01, 卷号: 21, 期号: 3, 页码: 548-553
Liu Jiye; Zhou Yongbin; Yang Shuguo; Feng Dengguo

 
能量分析攻击的攻防机理及评估技术研究 [学位论文]
博士, 北京: 中国科学院研究生院, 2011-11-01
刘继业
  |  
 
能量分析攻击的攻防机理及评估技术研究 [学位论文]
博士, 北京: 中国科学院研究生院, 2011-11-01
刘继业
  |  
 
密码模块安全测评标准的演进:现状、困境与趋势 [期刊论文]
成都信息工程学院学报, 2011-01-01, 卷号: 26, 期号: 2, 页码: 109-122
周永彬; 李建堂; 刘继业

 
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks [会议论文]
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang; Zhou Yongbin; Liu Jiye; Zhang Hailong
  |  
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  
 
measuring the effectiveness of dpa attacks- from the perspective of distinguishers statistical characteristics [会议论文]
2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Chengdu, China, 44021
Huang Jingang; Zhou Yongbin; Liu Jiye
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace