Results 281 to 290 of about 1,691,785 (320)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou +3 more
semanticscholar +2 more sources
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou +3 more
semanticscholar +2 more sources
Near Collision Attack Against Grain V1
International Conference on Applied Cryptography and Network Security, 2023S. Banik, Daniel Collins, W. Meier
semanticscholar +2 more sources
Correlation-Enhanced Power Analysis Collision Attack
Workshop on Cryptographic Hardware and Embedded Systems, 2010Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this work, we show that the principles of collision attacks can be adapted to efficiently break some ...
A. Moradi, Oliver Mischke, T. Eisenbarth
semanticscholar +2 more sources
Using the Collision Attack for Breaking Cryptographic Modes
International Conference on Computing Communication and Networking Technologies, 2022Presently the cipher system that is considered to be the industry gold standard is the Advanced Encryption Standard paired with the Cipher Block Chaining cryptographic mode (AES with CBC).
Albert H Carlson +2 more
semanticscholar +1 more source
Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery
International Symposium on High-Performance Computer Architecture, 2021Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn +6 more
semanticscholar +1 more source
How to Launch a Powerful Side-Channel Collision Attack?
IEEE transactions on computersA cryptographic implementation produces very similar power leakages when fed with the same input. Side-channel collision attacks exploit these similarities to establish the relationship between sub-keys and improve the efficiency of key recovery ...
Jiangshan Long +5 more
semanticscholar +1 more source
Traffic Collision Avoidance System: Threat Actor Model and Attack Taxonomy
2020 New Trends in Civil Aviation (NTCA), 2020As air travel increases across the globe, the opportunities for exploiting air communications increase as well. In modern aviation technology, the Traffic Collision Avoidance System (TCAS) is used to deter mid-air collisions between aircraft.
John Hannah, R. Mills, Richard Dill
semanticscholar +1 more source

