Results 1 to 10 of about 367,467 (252)

VERICA - Verification of Combined Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations.
Jan Richter-Brockmann   +3 more
doaj   +3 more sources

Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In recent years, smartphones have become an increasingly important storage facility for personal sensitive data ranging from photos and credentials up to financial and medical records like credit cards and person’s diseases.
Oleksiy Lisovets   +3 more
doaj   +1 more source

FIVER – Robust Verification of Countermeasures against Fault Injections

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann   +4 more
doaj   +1 more source

Automated Generation of Masked Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, protecting against physical side-channel attacks. Even though many different masking schemes have been presented over time, design and implementation of ...
David Knichel   +3 more
doaj   +1 more source

Generic Hardware Private Circuits

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
With an increasing number of mobile devices and their high accessibility, protecting the implementation of cryptographic functions in the presence of physical adversaries has become more relevant than ever.
David Knichel   +2 more
doaj   +1 more source

Randomness Optimization for Gadget Compositions in Higher-Order Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations.
Jakob Feldtkeller   +4 more
doaj   +3 more sources

Risky Translations: Securing TLBs against Timing Side Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz   +3 more
doaj   +1 more source

PROLEAD_SW

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks.
Jannik Zeitschner   +2 more
doaj   +1 more source

Book Review: Encounters with Hinduism [PDF]

open access: yes, 1999
A review of Encounters with Hinduism by Horst Georg ...
Dunbar, Scott Daniel
core   +2 more sources

Estilos geotectónicos bidimensionales y tridimensionales interbloques: Una nueva categoría neotectónica para la determinación de morfoestructuras montañosas

open access: yesInvestigaciones Geográficas, 1994
Cuban Archipelago geologic evolution reveals a W to E migration in Early Mezo–Cenozoic vulcanism and magmatism as well as an increased activity in neotectonics, seismicity, and recent secular endodynamics originating a conspicuous geomorphological ...
José Ramón Hernández Santana   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy