排序方式: 共有3条查询结果,搜索用时 250 毫秒
1
1.
Introduction Since Boneh et al[1]announced a model forbreaking public key cryptographic schemes by tak-ing advantage of random hardware faults in 1996,fault analysis has become an important aspect ofcrypto-analysis method. Fault analysis inducesfaults in tamper-resistant chips by means of radia-tion, X-rays, micro-probing or cut wires, so thatsome information of keys could leak from chips. Biham &Shamir applied fault attack to the ex-tension of block cipher cryptosystems such asDES, and call… 相似文献
2.
3.
1