This work was supported in part by National Natural Science Foundation of China(No.61632020,61472416,61772520);National key research and development program of China(No.2017YFB0802705);Key Research Project of Zhejiang Province(No.2017C01062);Fundamental Theory and Cutting-edge Technology Research Program of Institute of Information Engineering,CAS(No.Y7Z0321102).
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key...
supported in part by National Natural Science Foundation of China(No.61632020,61472416,61772520);National key research and development program of China(No.2017YFB0802705);Key Research Project of Zhejiang Province(No.2017C01062);Fundamental Theory and Cutting-edge Technology Research Program of Institute of Information Engineering,CAS(No.Y7Z0321102).
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key...