After being perturbed, chaotic system can generate chaotic binary sequences with uniform distribution and with statistic properties invulnerable to cryptographic analysis.
扰动后的系统服从均匀分布,具有更为理想的扩散特性和置乱特性。
Cryptanalysis: The analysis and deciphering of cryptographic writings or systems.
密码分析:对密码书写或密码系统的分析和译解。
Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step.
形式化分析由于其精炼、简洁和无二义性逐步成为分析密码协议的一条可靠和准确的途径。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
The random order execution which used in cryptographic ICs is a kind of few redundancy and low power countermeasures against power analysis attacks.
乱序执行是密码芯片设计中一种低冗余、低功耗的抵抗功耗分析攻击的方法。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols.
在两方密码协议运行模式分析法的基础上,利用模型检测的理论结果,提出了三方密码协议运行模式分析法。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
However, with the improvement of signal measurement and analysis technologies, cryptographic circuits are facing many kinds of attacking methods.
然而,随着测量技术和分析技术的不断进步,出现了许多破解加密集成电路的攻击方法。
The simulation software conducts the power analysis of cryptographic algorithm IP core which is described by hardware language.
该软件完成对硬件描述语言实现的密码算法IP核进行功耗分析。
Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.
安全协议特别是认证协议的非形式化分析在复杂的现代通信中变得尤其重要。
The design and analysis of cryptographic protocols are notoriously complex and error prone.
因此密码协议设计和密码协议分析是信息安全领域的难题。
The design and analysis of cryptographic protocols are notoriously complex and error prone.
因此密码协议设计和密码协议分析是信息安全领域的难题。
应用推荐