About 88 item dissertation in line with Power Analysis query results,the following is 1 to 50(Search took 0.030 seconds)

  1. Research and Implementation of Power Analysis Attacks Based on Cryptographic Chip of RSA Algorithm,LiuYaLing/Tianjin University,0/3
  2. The Design of AES IP Basesd on Mobile Phone Payment,HanLing/Huazhong University of Science and Technology,0/7
  3. Research on Some Elliptic Curve Cryptographic Algorithms,YuWei/University of Science and Technology of China,0/85
  4. Research on Power Analysis Attack and Countermeasure for Light Weight Block Cipher Algorithm,JiangPeiHe/Harbin Institute of Technology,0/53
  5. High-speed ECC Accelerator Resistant to Power Analysis Attack,CaoJie/Hangzhou University of Electronic Science and Technology,0/6
  6. High-Speed and Low-Power Physical Design for a GHz DDS SOC Chip,FuLang/Xi'an University of Electronic Science and Technology,0/13
  7. Research on Power Analysis Attack and Masking Countermeasure for Block Cipher Algorithm,ZhangKaiFeng/Harbin Institute of Technology,0/26
  8. The Design of RSA Algorithm and Implementation against Power Analysis,ShouNanQing/Hunan University,0/11
  9. Investigations of Power Analysis Attacks on Cryptographic Hardware of Rainbow Signature Scheme,LiBin/South China University of Technology,0/75
  10. Face Recogntion Algorithm Based on Gabor Feature,SunShuYu/Liaoning University of Science and Technology,0/129
  11. Research on Power Analysis Attacks and Defense Issues of Block Ciphers Chip,LiLang/Hunan University,0/84
  12. Collision Power Analysis on Lightweight Block Cipher Algorithm,YuYanYan/Shandong University,0/89
  13. Research on Low Power Mthodology and Implementation for Multipliers in IC Design,YuanBo/Xi'an University of Electronic Science and Technology,0/63
  14. On the Novel Techniques of Differential Power Analysis on Block Cipher Circuits,YuanZuo/Shanghai Jiaotong University,0/47
  15. The symmetric cryptographic algorithm against side channel attacks and its hardware,ZhaoJia/Fudan University,0/41
  16. Differential Power Analysis of the Stream Ciphers with Filter Structure,QuBo/Shanghai Jiaotong University,0/18
  17. The Research of Countermeasure Against Power Analysis Attack in Block Cipher Applications,YuanZheng/Hunan University,0/23
  18. Research on Differential Power Analysis of Cryptographic Chip and Security Evaluation,LiZhiQiang/PLA Information Engineering University,1/36
  19. The Research of IC Chip Side Channel Attack Analysis Method,LiZuo/Shanghai Jiaotong University,0/47
  20. Research on Cryptanalysis of eSTREAM Candidates,JiaYanYan/Xi'an University of Electronic Science and Technology,0/66
  21. The Application of Iterative Principal Component Analysis in Differential Power Analysis,LiuRenJie/Shanghai Jiaotong University,0/39
  22. Research and Design of Financial IC Card’s Transaction Security Based on the Emv Protocol,ZhangYouQiao/Donghua University,0/97
  23. Research on Methodologies of Power Analysis Attack and Cipher Chip Design for Resisting Power Analysis Attack,MiaoQuan/Shandong University,0/224
  24. The Design of Multi-fuctional Meter for AC&DC Parameters Based on Labview,TangLi/Nanchang University of Aeronautics and,0/219
  25. Theoretical Studies on Mechanisms of the Typical Electrode Processes Using Cyclic Reciprocal Derivative Chronopotentiometry (CRDCP),ChenLuHong/Nanjing University,0/29
  26. The Application Research of Advanced Encryption Standard and Short Block Encryption Technology,LiuLianHao/Central South University,2/383
  27. Research on the Non-algorithmic Power Analysis Resistant Methodologies of Cryptographic Integrated Circuits Design,LiXiangYu/Tsinghua University,3/312
  28. Research of Three Phase Voltage Source PWM Rectifier Control Technology,XuJinBang/Huazhong University of Science and Technology,60/3787
  29. Research on Power Analysis Attack Resistant SMS4 Cipher VLSI Design Technology,BaiXueFei/University of Science and Technology of China,0/165
  30. Research on Security Enhancement Strategy for Wireless Sensor Networks Chip,ChenYiCheng/Huazhong University of Science and Technology,3/345
  31. Research on Key Technologies for Bundled-data Asynchronous Circuits,ZengYongHong/Huazhong University of Science and Technology,0/119
  32. Research on the Fault Analysis of Some Block Ciphers,LiZuo/Shanghai Jiaotong University,4/310
  33. Research on Side Channel Attack Countermeasures of Encryption Chip,LiHaiJun/Harbin Engineering University,3/271
  34. Feature Extraction Algorithms for Face Recognition under Varying Illumination,LiuZhongHua/Nanjing University of Technology and Engineering,0/167
  35. Defense attack of the information security chip technology research,HanJun/Fudan University,0/368
  36. Research on Key Technologies of Cryptographic System on a Chip,WangAn/Shandong University,0/57
  37. Study of Gain-spectrum-flattening of Fiber Raman Amplifiers,JiangHaiMing/University of Electronic Science and Technology,0/56
  38. Research on Circuit-level Design Against Power Analysis Attack for Cryptographic Chip,LeDaZuo/National University of Defense Science and Technology,0/82
  39. Low Power LDPC Decoder Design,ZhaoYao/Shanghai Jiaotong University,0/201
  40. Research on Power Analysis and Their Practical Countermeasures,WangYanBo/Shanghai Jiaotong University,0/19
  41. The Study and Implementation of PA-resistant Logic Styles,ShiWei/National University of Defense Science and Technology,2/143
  42. A Research of Power Analysis Attacks Method and Countermeasures on Advanced Encryption Standard,LiuShangLi/Central South University,2/148
  43. On Nietzche’s Psychological Ideas,LiuLi/Jilin University,0/297
  44. Criminal Trial Preliminary findings of fact,QiYaPing/Southwest University of Political Science,0/184
  45. The portable peak power analyzer design,LiuZhengYu/University of Electronic Science and Technology,0/198
  46. Raman fiber amplifier simulation,WangFang/Southeast University,3/226
  47. Analysis and Research for Apple Industry Development and International Competitive Power in China,ZhengZhenHua/Northwest University of Science and Technology,3/386
  48. Energy analysis software simulation of the AES algorithm,WangZhi/University of Electronic Science and Technology,2/238
  49. RSA public key cryptography algorithm of power analysis attacks and defense research,LiXin/University of Electronic Science and Technology,2/353
  50. Energy Analysis of Elliptic Curve Cryptography,ZhouWenJin/University of Electronic Science and Technology,0/136

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile