Dear editor,Cache timing attack is a very powerful side channel attack technique to break cryptographic ***,Flush-Reload,a new type of cache attacks,was proposed to attack cryptographic implementations on multi-core *...
详细信息
Dear editor,Cache timing attack is a very powerful side channel attack technique to break cryptographic ***,Flush-Reload,a new type of cache attacks,was proposed to attack cryptographic implementations on multi-core *** utilizes a spy processes S to monitor the victim process V which shares the same memory pages.S flushes the specific memory lines of V,evicts data
With the emerging of new types of network forms, services and cloud computation, the situation has transformed from one party to many parties at least one of both communication ends, that is "one-to-many," &...
详细信息
This paper presents a novel super-resolution time of arrive(TOA) estimation algorithm, which utilizes the primary synchronization signal(PSS) in LTE downlink. Unlike the conventional coherent detection algorithm with ...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
This paper presents a novel super-resolution time of arrive(TOA) estimation algorithm, which utilizes the primary synchronization signal(PSS) in LTE downlink. Unlike the conventional coherent detection algorithm with sample-level estimation accuracy, the proposed algorithm fully takes advantage of phase characteristic of the sampled orthogonal frequency division multiplexing(OFDM) signal to reach subsample resolution accuracy without increasing sampling frequency. With a number of simulation experiments, the efficacy of the proposed TOA estimation algorithm is validated by numerical results. The different performance shown in additive white Gaussian noise(AWGN) channel and fading channel indicates that this algorithm can be used in open environment or indoors with high-precision positioning requirements.
It has been challenging work to identify block ciphers under CBC mode over the past few decades. But we can still conduct the identification of block ciphers under CBC mode if enough ciphertext streams are available. ...
详细信息
Multipath TCP (MPTCP) enables terminals utilizing multiple interfaces for data transmission simultaneously, which provides better performance and brings many benefits. However, using multiple paths brings some new cha...
详细信息
Fault analysis is a very powerful technique to break cryptographic *** particular,bitlevel fault analysis(BLFA),where faults are injected by flipping one or a few isolated bits,are among the most efficient of the *** ...
详细信息
Fault analysis is a very powerful technique to break cryptographic *** particular,bitlevel fault analysis(BLFA),where faults are injected by flipping one or a few isolated bits,are among the most efficient of the *** requires both precise fault injection capabilities and sophisticated key extraction *** fault analysis(AFA)[1]is a good analysis technique for *** with differential fault analysis(DFA),AFA relies on the automation from machine *** it fully utilizes the leakages
Dear editor,The main objective of side-channel analysis(SCA)is to extract the secret key using physical leakages from underlying fundamental logic *** analysis(PA)is one type of SCA,such as simple power analysis(SPA),...
详细信息
Dear editor,The main objective of side-channel analysis(SCA)is to extract the secret key using physical leakages from underlying fundamental logic *** analysis(PA)is one type of SCA,such as simple power analysis(SPA),differential power
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additiv...
详细信息
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additive white Gaussian noise (AWGN) channels. A fixed redundancy (FR) coding scheme is considered, which encodes each k-bits update as an n-bits packet by a low-density parity-check (LDPC) code. By using the renewal-reward theory, a closed-form expression of the average AoI under the FR scheme is derived. Simulation results show that the average AoI relies on E_b/N_0, especially in the low E_b/N_0 region. For different E_b/N_0, an optimal code length always exists to minimize the average AoI. In addition, the same average AoI can be achieved with different code lengths in the high E_b/N_0 region. Hence, in the high E_b/N_0 region, short codes are preferred especially when the transmission delay is taken into account.
This paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The ...
详细信息
暂无评论