Results 281 to 290 of about 1,839,896 (336)

Differential Power Analysis of CAST-128

2010 IEEE Computer Society Annual Symposium on VLSI, 2010
Power analysis is used to reveal the secret key of security devices by monitoring the power consumption of certain cryptographic algorithm operations through a statistical analysis approach known as Differential Power Analysis (DPA). Whilst this has been applied extensively to attacks on FPGA devices, there has been little research into attacks on ASIC
Keanhong Boey   +3 more
openaire   +1 more source

Differential Power Analysis of XMSS and SPHINCS

2018
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature schemes are notable candidates for deployment. No rigorous side-channel analysis of hash-based signature schemes has been conducted so far.
Matthias J. Kannwischer   +4 more
openaire   +2 more sources

General scheme of differential power analysis

2013 36th International Conference on Telecommunications and Signal Processing (TSP), 2013
Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the measured power traces to determine some sensitive information to abuse the device. Differential power analysis attacks are the most popular because the attacker does not need detailed knowledge about the attacked device but on ...
Zdenek Martinasek   +2 more
openaire   +1 more source

Anatomy of Differential Power Analysis for AES

2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2008
Side channel attacks are a significant threat to the deployment of secure embedded systems. Differential power analysis is one of the powerful power analysis attacks, which can be exploited in secure devices such as smart cards, PDAs and mobile phones. Several researchers in the past have presented experiments and countermeasures for differential power
Jude Angelo Ambrose   +3 more
openaire   +1 more source

Evolutionary ciphers against differential power analysis and differential fault analysis

Science China Information Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ming Tang 0002   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy