supported by the National Natural Science Foundation of China(Grant Nos.61202386,60970116,60970115,61003268,61003267)
It has been widely accepted that the security cryptosystems should be only dependent on the security of their secret keys. However, there are still secret ciphers with unknown components in their commercial applicatio...
sponsored by National Natural Science Foundation of China (Grant Nos. 60970116, 60970115,90718006, 61003267)
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system security. The existing SCAs generally require the knowledge of the corresponding crypto- graphic algori...
supported by National Natural Science Foundation of China(Grand Nos.60970006,60970115,91018008);Key Laboratory Open Fund of Sky Information Security and Trusted Computing(Grand No.AISTC2009_04);Shanghai Key Subject and Committee of Science and Technology of Key Laboratory(Grand Nos.S30108,08DZ2231100)
Considering potential attacks from cloud-computing and quantum-computing, it is becoming necessary to provide higher security elliptic curves. The hidden Markov models are introduced for designing the trace-vector com...
Supported by the National Natural Science Foundation of China (60970115, 91018008)
The conception of orthomorphism has been generalized in this paper, and a counting formula on the generalized linear orthomorphism in the vector space over the Galois field with the arbitrary prime number p as the cha...
Supported by the National Natural Science Foundation of China(60970115, 61003268, 91018008);Natural Science Foundation of Hubei (2009429);Fundamental Research Funds for the Central Universities(3101038);National Defense Foster Project of Wuhan University (29)
This paper presents a trusted-environment construction method based on the underlying hardware. This method aims at protecting the security-sensitive software in the aspects of software loading, running, and storing i...