Results 1 to 10 of about 587,598 (211)
Correlation Power Analysis Attack for AES Based on Wavelet Packet [PDF]
In Correlation Power Analysis(CPA) attack,the existence of power curves noise affects the success rate of attack results.For this reason,this paper proposes a new method of power curve preprocessing using wavelet packet threshold.The wavelet packet ...
DUAN Xiaoyi,SHE Gaojian,GAO Xianwei,HE Siman,CUI Qi,WANG Sixiang,MAO Zeyu
doaj +2 more sources
GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks
The Tor network, renowned for its provision of online privacy and anonymity, faces the constant threat of correlation attacks that aim to compromise user identities.
Muhammad Asfand Hafeez +3 more
doaj +1 more source
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet +3 more
doaj +1 more source
A topological index is a numerical quantity associate with a graph describes its topology by applying molecular structure of a chemical compound, we obtain its properties theoretically.
Muhammad Waheed Rasheed +2 more
doaj +1 more source
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang +6 more
doaj +1 more source
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang +4 more
doaj +1 more source
On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa +14 more
core +3 more sources
Comparative study of power analysis attacks based on template and KNN algorithm
Power analysis attack is still the most threatening type of side channel attack on cryptographic hardware.The template analysis attack with the attack of KNN algorithm was compared.Firstly, three dimensionality reduction methods of Pearson correlation ...
Jifang JIN +4 more
doaj +2 more sources
The key for the power grid to deal with cyber security threats is to make full use of cyber and electrical information to improve the self-adaptation ability and automation for identification of malicious attack event.
Rui ZHANG +5 more
doaj +1 more source
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System
Smart Grid Monitoring System(SGMS) is an important means to protect the security of smart grid. The high volumes of alerts generated by SGMS often confuse managers.
Hua Zhang +6 more
doaj +1 more source

