Results 21 to 30 of about 1,839,896 (336)

Differential Power Analysis [PDF]

open access: yes, 1999
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices.
Paul C. Kocher   +2 more
openaire   +1 more source

An Energy Trace Compression Method for Differential Power Analysis Attack

open access: yesIEEE Access, 2020
Differential power analysis attacks are the most commonly used means to break cryptographic devices within the side-channel attack technology. Since there is a lot of noise in the energy trace of cryptographic devices, a large number of energy traces are
Xiaomin Cai   +3 more
doaj   +1 more source

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +1 more source

Chosen Plaintext Combined Attack against SM4 Algorithm

open access: yesApplied Sciences, 2022
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key.
Jintao Rao, Zhe Cui
doaj   +1 more source

Bisimulation Relations Between Automata, Stochastic Differential Equations and Petri Nets [PDF]

open access: yes, 2010
Two formal stochastic models are said to be bisimilar if their solutions as a stochastic process are probabilistically equivalent. Bisimilarity between two stochastic model formalisms means that the strengths of one stochastic model formalism can be used
Henk A.P. Blom   +3 more
core   +3 more sources

Frequency Domain Analysis of Load Frequency Control Using PIDTune Model Standard

open access: yesAndalas Journal of Electrical and Electronic Engineering Technology, 2023
The load frequency control system aims to regulate the frequency in the electric power system at a normal value with a predetermined tolerance limit. In practice, the load frequency control system does not always operate optimally, therefore a controller
Heru Dibyo Laksono   +2 more
doaj   +1 more source

Differential Power Analysis enhancement with statistical preprocessing [PDF]

open access: yes2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), 2010
Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of power consumption measurements monitored on an Integrated Circuit (IC) computing cryptographic operations.
Lomné, Victor   +4 more
openaire   +1 more source

Power analysis for RNA-Seq differential expression studies

open access: yesBMC Bioinformatics, 2017
Background Sample size calculation and power estimation are essential components of experimental designs in biomedical research. It is very challenging to estimate power for RNA-Seq differential expression under complex experimental designs.
Lianbo Yu, Soledad Fernandez, Guy Brock
doaj   +1 more source

A High-order Differential Power Analysis Attack Scheme with Masked AES Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
In view of the serious threats that power analysis attacks causes on the security of the cipher chip,based on the in-depth study of masked technology,this paper proposes a High Order Differential Power Analysis(HODPA) scheme which attacks the fixed value
DUAN Xiaoyi,WANG Sixiang,CUI Qi,SUN Kewang
doaj   +1 more source

Portal Dynamics Learning Method for Renewable-integrated Regional Power Networks Based on Neural Differential-Algebraic Equations

open access: yesZhongguo dianli, 2023
In the context of high penetration of renewables, it is very important for new power system dynamic analysis to establish a dynamic model that can accurately describe the portal dynamics of renewable-integrated regional power networks under the influence
Bin CAO   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy