期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
1
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
2
作者 朱念好 周玉洁 刘红明 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第2期169-172,共4页
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea... Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. 展开更多
关键词 correlation power analysis cryptograph differential power analysis leakage power analysis(LPA) power analysis simple power analysis
原文传递
A Fast Algorithm of Scalar Multiplication Based on Side-Channel Atomicity
3
作者 郝玉洁 殷石 《China Communications》 SCIE CSCD 2011年第2期134-139,共6页
Simple power analysis is the most devastating attack on the security of elliptic curve scalar multiplication and can probably retrieve the secret key. In this paper,we analyze the formulas of point doubling and additi... Simple power analysis is the most devastating attack on the security of elliptic curve scalar multiplication and can probably retrieve the secret key. In this paper,we analyze the formulas of point doubling and addition on Jacobi-quartic Curve in projective coordination. In addition,a fast and secure side-channel atomic scalar multiplication algorithm is proposed using the side-channel atomic block. Compared with the previous methods,the new algorithm is more efficient. For 192 bits scalar using NAF recoding,the efficiency of the new algorithm is increased by about 6.7%~23% if S/M=0.8 or 12.7%~33.2% if S/M=0.6. 展开更多
关键词 jacobi-quartic curve scalar multipli-cation simple power analysis side-channel atomicity
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部