Results 291 to 300 of about 1,839,896 (336)
Some of the next articles are maybe not open access.

Stochastic Power Loss Analysis of Differential Power Processing

IEEE Transactions on Power Electronics, 2022
This article presents stochastic power loss analysis for differential power processing (DPP). A stochastic model is developed to analyze power loss scaling in a DPP system based on probability distributions of loads or sources. Scaling factors are introduced to describe how losses change with DPP system size and load or source power variance.
Ping Wang   +3 more
openaire   +1 more source

GPU accelerated Differential Power Analysis

MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012
Differential Power Analysis (DPA) is a powerful technique that has proven devastatingly effective against various encryption algorithms such as AES, Triple-DES and RSA. DPA has been able to successfully extract the secret key from these algorithms during the process of decrypting cyphertext information.
Hiren J. Patel, Rusty Baldwin
openaire   +1 more source

Power consumption traces realignment to improve differential power analysis

14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2011
Cryptographic devices can be subject to side-channel attacks. Among those attacks, Differential Power Analysis (DPA) has proven to be very effective and easy to perform. Several countermeasures have been proposed in the literature. However, the effectiveness of these counter measures is still evaluated by resort-ing to intensive DPA simulations and ...
Di Natale, Giorgio   +4 more
openaire   +2 more sources

Statistical Analysis of Second Order Differential Power Analysis

IEEE Transactions on Computers, 2009
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA, higher order masking may be employed but it implies a nonnegligible overhead.
Emmanuel Prouff   +2 more
openaire   +2 more sources

Random clock against differential power analysis

2010 IEEE Asia Pacific Conference on Circuits and Systems, 2010
Cryptographic systems are being compromised by power analysis attacks. In this paper, a novel countermeasure technique against power analysis attacks is proposed which dynamically varies the clock when executing operations (making it difficult to correlate power traces in the time domain) and inserts dummy operations during idling clock cycles ...
Keanhong Boey   +3 more
openaire   +1 more source

Differential Power Analysis of the Picnic Signature Scheme

2021
This work introduces the first differential side-channel analysis of the Picnic Signature Scheme, an alternate candidate in the ongoing competition for post-quantum cryptography by the National Institute of Standards and Technology (NIST). We present a successful side-channel analysis of the underlying multiparty implementation of the LowMC block ...
Tim Gellersen   +2 more
openaire   +2 more sources

Differential Power Analysis as a digital forensic tool

Forensic Science International, 2013
Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS).
T, Souvignet, J, Frinken
openaire   +2 more sources

Ways to Enhance Differential Power Analysis

2003
In [1] P. Kocher et al. introduced Differential Power Analysis (DPA), a statistical test (the difference of means) to retrieve secret keys from smart cards power consumption. For the correct hypothesis on the key, the difference of means is significantly different from zero. Hence a large peak is observed in the trace of the difference of means for the
Régis Bevan, Erik Knudsen
openaire   +1 more source

Accelerating differential power analysis on heterogeneous systems

Proceedings of the 9th Workshop on Embedded Systems Security, 2014
Differential Power Analysis (DPA) attacks allows discovering the secret key stored into secure embedded systems by exploiting the correlation between the power consumed by a device and the data being processed. The computation involved is generally relatively simple, however, if the used power traces are composed by a large number of points, the ...
João Amaral   +3 more
openaire   +1 more source

Differential Power Analysis using wavelet decomposition

MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012
Differential Power Analysis (DPA) has been successfully used against crytographic hardware to extract the secret key in a non-invasive manner. However, the great success of DPA requires a large number of traces to overcome system noise or countermeasures, which equates to increased processing times and computing hardware requirements.
Hiren J. Patel, Rusty Baldwin
openaire   +1 more source

Home - About - Disclaimer - Privacy