supported in part by National Basic Research Program of China (973 Program) (Grant No. 2013CB338004);National Natural Science Foundation of China (Grant Nos. 61173191, 61272491, 61309021, 61472357, 61571063);Zhejiang University Fundamental Research Funds for the Central Universities (Grant No. 2015QNA5005);Science and Technology on Communication Security Laboratory (Grant No. 9140C110602150C11053)
Fault analysis is a very powerful technique to break cryptographic implementations.In particular,bitlevel fault analysis(BLFA),where faults are injected by flipping one or a few isolated bits,are among the most effi...
supported by State Key Program of National Natural Science of China (Grant No. 61232004);National Basic Research Program of China (973 Program) (Grant No. 2011CB302305);National High-tech R&D Program of China (863 Program) (Grant No. 2013AA013203)
In recent years, Content Subscription Service (CSS) is showing a notable success in helping users fetch unpopular data in P2P networks. It works by maintaining a storage pool to pull the subscribed file and then red...