The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen...The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.展开更多
This paper provides an account of how a voluntary professional association (or industry representative body) in Victoria, Australia, led a whole-of-industry response to an alarming increase in on-board assaults on b...This paper provides an account of how a voluntary professional association (or industry representative body) in Victoria, Australia, led a whole-of-industry response to an alarming increase in on-board assaults on bus drivers by passengers, and the resulting impact on drivers' health and well-being. Influenced by literature and guided by the results from two commissioned research pieces, the association developed and implemented a five pillar strategy to address these issues. A stakeholder perspective was adopted to develop the strategy in order to ensure high relevance and value by being as inclusive as possible across the entire industry, and agency theory underpinned the association's implementation of the strategy. It is hoped that this case study exemplar will assist increase the productivity and social capital of an industry. others in utflising theory for policy change with a view to展开更多
基金supported by the National Major Program "Core of Electronic Devices,High-End General Chips,and Basis of Software Products" of the Ministry of Industry and Information Technology of China (Nos.2014ZX01032205,2014ZX01032401001-Z05)the National Natural Science Foundation of China(No.61402252) "12th Five-Year Plan" The National Development Foundation for Cryptological Research(No. MMJJ201401009)
文摘The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.
文摘This paper provides an account of how a voluntary professional association (or industry representative body) in Victoria, Australia, led a whole-of-industry response to an alarming increase in on-board assaults on bus drivers by passengers, and the resulting impact on drivers' health and well-being. Influenced by literature and guided by the results from two commissioned research pieces, the association developed and implemented a five pillar strategy to address these issues. A stakeholder perspective was adopted to develop the strategy in order to ensure high relevance and value by being as inclusive as possible across the entire industry, and agency theory underpinned the association's implementation of the strategy. It is hoped that this case study exemplar will assist increase the productivity and social capital of an industry. others in utflising theory for policy change with a view to