Cryptographic core design security verification and vulnerability detection based on information flow analysis

Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the mathematical perspective are two different problem...

Full description

Bibliographic Details
Main Authors: MA Yixin, TANG Shibo, TAN Jing, LI Xuefei, HU Wei
Format: Article
Language:zho
Published: EDP Sciences 2022-02-01
Series:Xibei Gongye Daxue Xuebao
Subjects:
Online Access:https://www.jnwpu.org/articles/jnwpu/full_html/2022/01/jnwpu2022401p76/jnwpu2022401p76.html