文件名称:AnalysisofmaximizeddifferentialpoweragainstAES(1).
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
在讨论AES 功耗模型的基础上,提出了一种新的最大差分功耗攻击(MDPA) 的方法. 算法对被攻击的
部分明文用猜测的密钥进行变换,采用差分的方法去除噪声,比较由变换后的明文和正确密钥产生的一组功
耗值,通过寻找最大功耗值得到正确的密钥.-Power model in the discussion on the basis of AES, a new maximum differential power attacks (MDPA) method. Algorithm was attacked by guessing a key part of the plaintext is transformed difference method used to remove noise, Comparison of the transformed plain text and the correct key value generated by a set of power consumption, maximum power is worth by looking to the right key.
部分明文用猜测的密钥进行变换,采用差分的方法去除噪声,比较由变换后的明文和正确密钥产生的一组功
耗值,通过寻找最大功耗值得到正确的密钥.-Power model in the discussion on the basis of AES, a new maximum differential power attacks (MDPA) method. Algorithm was attacked by guessing a key part of the plaintext is transformed difference method used to remove noise, Comparison of the transformed plain text and the correct key value generated by a set of power consumption, maximum power is worth by looking to the right key.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
针对高级数据加密标准的最大差分功耗分析(1).pdf