Cryptographic core design security verification and vulnerability detection based on information flow analysis
Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the mathematical perspective are two different problem...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
EDP Sciences
2022-02-01
|
Series: | Xibei Gongye Daxue Xuebao |
Subjects: | |
Online Access: | https://www.jnwpu.org/articles/jnwpu/full_html/2022/01/jnwpu2022401p76/jnwpu2022401p76.html |