Results 1 to 10 of about 4,114,970 (193)

VERICA - Verification of Combined Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations.
Jan Richter-Brockmann   +3 more
doaj   +3 more sources

FIVER – Robust Verification of Countermeasures against Fault Injections

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann   +4 more
doaj   +1 more source

Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In recent years, smartphones have become an increasingly important storage facility for personal sensitive data ranging from photos and credentials up to financial and medical records like credit cards and person’s diseases.
Oleksiy Lisovets   +3 more
doaj   +1 more source

Automated Generation of Masked Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, protecting against physical side-channel attacks. Even though many different masking schemes have been presented over time, design and implementation of ...
David Knichel   +3 more
doaj   +1 more source

PROBLEMS AND SOLUTIONS FOR IMPLEMENTATION OF "ONLINE DEPOSITS" IN INDONESIA: DESCRIPTION ANALYSIS [PDF]

open access: yesMalaysian E Commerce Journal, 2021
Banking digitalization is an effort to continue to innovate to provide various facilities and conveniences for customers when conducting financial transactions through their smartphones.
Santi Pisi, Girang Permata Gusti
doaj   +1 more source

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz   +9 more
doaj   +1 more source

Randomness Optimization for Gadget Compositions in Higher-Order Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations.
Jakob Feldtkeller   +4 more
doaj   +3 more sources

Generic Hardware Private Circuits

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
With an increasing number of mobile devices and their high accessibility, protecting the implementation of cryptographic functions in the presence of physical adversaries has become more relevant than ever.
David Knichel   +2 more
doaj   +1 more source

Risky Translations: Securing TLBs against Timing Side Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz   +3 more
doaj   +1 more source

PROLEAD_SW

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks.
Jannik Zeitschner   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy