Results 1 to 10 of about 367,467 (252)
VERICA - Verification of Combined Attacks
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations.
Jan Richter-Brockmann +3 more
doaj +3 more sources
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
In recent years, smartphones have become an increasingly important storage facility for personal sensitive data ranging from photos and credentials up to financial and medical records like credit cards and person’s diseases.
Oleksiy Lisovets +3 more
doaj +1 more source
FIVER – Robust Verification of Countermeasures against Fault Injections
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann +4 more
doaj +1 more source
Automated Generation of Masked Hardware
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, protecting against physical side-channel attacks. Even though many different masking schemes have been presented over time, design and implementation of ...
David Knichel +3 more
doaj +1 more source
Generic Hardware Private Circuits
With an increasing number of mobile devices and their high accessibility, protecting the implementation of cryptographic functions in the presence of physical adversaries has become more relevant than ever.
David Knichel +2 more
doaj +1 more source
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations.
Jakob Feldtkeller +4 more
doaj +3 more sources
Risky Translations: Securing TLBs against Timing Side Channels
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz +3 more
doaj +1 more source
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks.
Jannik Zeitschner +2 more
doaj +1 more source
Book Review: Encounters with Hinduism [PDF]
A review of Encounters with Hinduism by Horst Georg ...
Dunbar, Scott Daniel
core +2 more sources
Cuban Archipelago geologic evolution reveals a W to E migration in Early Mezo–Cenozoic vulcanism and magmatism as well as an increased activity in neotectonics, seismicity, and recent secular endodynamics originating a conspicuous geomorphological ...
José Ramón Hernández Santana +2 more
doaj +1 more source

