攻击者同时利用正确的和错误的加密结果来发现隐藏在密码设备中的秘密信息(密钥)。
The attacker exploits the correct and incorrect encryption results to disclose the secret information (key) hidden in the cryptographic device.
同时给出了信息隐藏的游戏模型及EP模型,在确定了失真度量和攻击信道之后给出了各自的容量计算方法。
Meanwhile the game model and EP model are investigated and how to compute the capacity of information hiding for each model is illustrated later.
同时给出了信息隐藏的游戏模型及EP模型,在确定了失真度量和攻击信道之后给出了各自的容量计算方法。
Meanwhile the game model and EP model are investigated and how to compute the capacity of information hiding for each model is illustrated later.
应用推荐