排序方式: 共有14条查询结果,搜索用时 15 毫秒
1.
2.
Introduction Since Boneh et al[1]announced a model forbreaking public key cryptographic schemes by tak-ing advantage of random hardware faults in 1996,fault analysis has become an important aspect ofcrypto-analysis method. Fault analysis inducesfaults in tamper-resistant chips by means of radia-tion, X-rays, micro-probing or cut wires, so thatsome information of keys could leak from chips. Biham &Shamir applied fault attack to the ex-tension of block cipher cryptosystems such asDES, and call… 相似文献
3.
提出了一种有效的故障注入攻击技术,能够攻击一类使用特定结构SPN密码的设备.这种攻击方法基于字节错误模型,仅需要少量故障密文即可攻破一类具有特定置换层的SPN密码算法.分析给出了故障和特定置换层如何导致秘密信息泄露的原因.同时,对于具体的密码算法ARIA和PRESENT进行了攻击实例. 相似文献
4.
1.故障现象: 一辆俄罗斯生产的克拉斯(KRAZ)货车在发动机低速运转时电流表指示充电,但加大油门汽车以较高速度运行时,电流表指示大电流放电,即发电机不能发电。 2.故障检测: 起初认为是电压调节器故障,后发现励磁线圈的引出线头与滑环松动,用手一拉线头与滑环脱离。 相似文献
5.
随着科技的高速发展,互联网信息的普及,网吧已成为一项热门的行业。但是,近年来,“网吧”等互联网上网营业场所过多过滥,业主无视消防安全,消防管理无序,安全隐患突出,严重威胁了人民生命财产的安全,扰乱了社会秩序。一些所谓的“问题网吧”、“黑网吧”大量衍生,无证照、手续不全的网吧数量还在不断上升,埋下了致灾的隐患,由此造成的重、特大火灾事故在发达地区和不发达地区均有发生。2002年6月16日, 相似文献
6.
集装箱装卸桥(以下简称桥吊)是集装箱专用码头的主要装卸工具,它的好坏直接影响到集装箱码头的正常运转.当一台新桥吊投产十多年以后,其老化现象将十分严重,虽可经过多次技术改造,但频繁作业仍使其故障率很高且时有掉箱事故发生.本文利用Kennth J.Graham和Gilbert F.Kinney提出的作业条件的危险性评价对桥吊作业危险性进行评价,以便根据评价得到的客观结果提出有效的对策. 相似文献
7.
装有粮食、原木、钢材、矿石、煤炭、蔬菜等一类货物的船舱和一些密闭空间内具有缺氧的危险性,人一旦进入未经通风和检测的这种船舱和空间,就有可能发生窒息事故.1977年9月,天津港发生了一起生铁船舱缺氧窒息事故;1980年,秦皇岛港发生了一起玉米船舱缺氧窒息事故;1983年,张家港港发生了一起原木船舱缺氧窒息事故等等.船舱和一些密闭空间常出现缺氧及二氧化碳浓度升高现象,主要有以下5个方面的原因. 相似文献
8.
船舶经过一段时间的运营后.或多或少会出现一些问题,而在船舶进厂维修过程中.油船发生火灾爆炸事故的概率比较大.原因就在于油船同其它船舶有许多不同之处,为此,特将油船进厂修理过程中一些单位的经验做法.作一下梳理,变成一个工作“流程”。以供参考。 相似文献
9.
Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential composition lemma for precise zero-knowledge protocols.However,this lemma doesn't provide tight precisions for composed protocols.In this paper we further obtain a sequential composition lemma for a subclass of precise zero-knowledge protocols,which all satisfy a property:their simulators use the cod... 相似文献
10.
Precise zero-knowledge was introduced by Micali and Pass in STOC’06. This notion captures the idea that the view of a verifier
can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments,
in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by
them to provide a precise simulator for a modified Kilian’s zero-knowledge arguments with poly-logarithmic efficiency (this
modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logarithmic
efficiency. We also present an alternative construction of the desired protocols. 相似文献