The label“posthumanism”identifies neither a doctrine,nor an intellectual or analytical approach with a defining set of protocols.Rather,we may take“posthumanism”as a term loosely applied to a range of contribution...The label“posthumanism”identifies neither a doctrine,nor an intellectual or analytical approach with a defining set of protocols.Rather,we may take“posthumanism”as a term loosely applied to a range of contributions and approaches,on the basis of a generally under-specified collection of sympathies and commitments.Approximately stated,these sympathies and commitments would entail the claim that—with due allowance for historical variation—the category of“the human”has long played a key role at the centre of Western thought;that this role has included serving to justify the promotion of human beings above other forms of being,and indeed within this,over its history,the violent oppression of the great majority of human beings themselves;and that,in league with the effects of various recent technological developments,it is therefore important to decentre,relativize,critique,and perhaps even move beyond“the human”.In this article,I will accordingly not look to define the term“posthumanism”:rather,I will present some of the background to and influences on the range of contributions and approaches that have come to be assembled under this label;delineate two principles which may be discerned within these contributions and approaches;and consider some of the critiques which these“posthumanist”interventions have attracted.Ultimately,I will argue that the label itself matters less than the impulses behind the contributions it has come to identify.展开更多
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P...Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks.展开更多
贵刊1996年第8期51和52页分别刊登了《从六级考试看“more...than”引起的从句》和《从六级考试看 than 的一个用法》两篇文章。前文认为 than 既是连词也可以作从句的主语,后文把 than 看作关系代词,说它引导的是一个比较意义的定语从...贵刊1996年第8期51和52页分别刊登了《从六级考试看“more...than”引起的从句》和《从六级考试看 than 的一个用法》两篇文章。前文认为 than 既是连词也可以作从句的主语,后文把 than 看作关系代词,说它引导的是一个比较意义的定语从句,than 在定语从句中作主语或宾语。两位作者的论述虽不无道理,但在语法著作中找不到关于这种提法的充分证据。复旦大学主编的《大学英语》展开更多
文摘The label“posthumanism”identifies neither a doctrine,nor an intellectual or analytical approach with a defining set of protocols.Rather,we may take“posthumanism”as a term loosely applied to a range of contributions and approaches,on the basis of a generally under-specified collection of sympathies and commitments.Approximately stated,these sympathies and commitments would entail the claim that—with due allowance for historical variation—the category of“the human”has long played a key role at the centre of Western thought;that this role has included serving to justify the promotion of human beings above other forms of being,and indeed within this,over its history,the violent oppression of the great majority of human beings themselves;and that,in league with the effects of various recent technological developments,it is therefore important to decentre,relativize,critique,and perhaps even move beyond“the human”.In this article,I will accordingly not look to define the term“posthumanism”:rather,I will present some of the background to and influences on the range of contributions and approaches that have come to be assembled under this label;delineate two principles which may be discerned within these contributions and approaches;and consider some of the critiques which these“posthumanist”interventions have attracted.Ultimately,I will argue that the label itself matters less than the impulses behind the contributions it has come to identify.
基金National Natural Science Foundation of China(62472397)Innovation Program for Quantum Science and Technology(2021ZD0302902)。
文摘Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks.
文摘贵刊1996年第8期51和52页分别刊登了《从六级考试看“more...than”引起的从句》和《从六级考试看 than 的一个用法》两篇文章。前文认为 than 既是连词也可以作从句的主语,后文把 than 看作关系代词,说它引导的是一个比较意义的定语从句,than 在定语从句中作主语或宾语。两位作者的论述虽不无道理,但在语法著作中找不到关于这种提法的充分证据。复旦大学主编的《大学英语》