Results 21 to 30 of about 1,839,896 (336)
Differential Power Analysis [PDF]
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices.
Paul C. Kocher +2 more
openaire +1 more source
An Energy Trace Compression Method for Differential Power Analysis Attack
Differential power analysis attacks are the most commonly used means to break cryptographic devices within the side-channel attack technology. Since there is a lot of noise in the energy trace of cryptographic devices, a large number of energy traces are
Xiaomin Cai +3 more
doaj +1 more source
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky +6 more
doaj +1 more source
Chosen Plaintext Combined Attack against SM4 Algorithm
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key.
Jintao Rao, Zhe Cui
doaj +1 more source
Bisimulation Relations Between Automata, Stochastic Differential Equations and Petri Nets [PDF]
Two formal stochastic models are said to be bisimilar if their solutions as a stochastic process are probabilistically equivalent. Bisimilarity between two stochastic model formalisms means that the strengths of one stochastic model formalism can be used
Henk A.P. Blom +3 more
core +3 more sources
Frequency Domain Analysis of Load Frequency Control Using PIDTune Model Standard
The load frequency control system aims to regulate the frequency in the electric power system at a normal value with a predetermined tolerance limit. In practice, the load frequency control system does not always operate optimally, therefore a controller
Heru Dibyo Laksono +2 more
doaj +1 more source
Differential Power Analysis enhancement with statistical preprocessing [PDF]
Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of power consumption measurements monitored on an Integrated Circuit (IC) computing cryptographic operations.
Lomné, Victor +4 more
openaire +1 more source
Power analysis for RNA-Seq differential expression studies
Background Sample size calculation and power estimation are essential components of experimental designs in biomedical research. It is very challenging to estimate power for RNA-Seq differential expression under complex experimental designs.
Lianbo Yu, Soledad Fernandez, Guy Brock
doaj +1 more source
A High-order Differential Power Analysis Attack Scheme with Masked AES Algorithm [PDF]
In view of the serious threats that power analysis attacks causes on the security of the cipher chip,based on the in-depth study of masked technology,this paper proposes a High Order Differential Power Analysis(HODPA) scheme which attacks the fixed value
DUAN Xiaoyi,WANG Sixiang,CUI Qi,SUN Kewang
doaj +1 more source
In the context of high penetration of renewables, it is very important for new power system dynamic analysis to establish a dynamic model that can accurately describe the portal dynamics of renewable-integrated regional power networks under the influence
Bin CAO +4 more
doaj +1 more source

