Results 1 to 10 of about 4,114,970 (193)
VERICA - Verification of Combined Attacks
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations.
Jan Richter-Brockmann +3 more
doaj +3 more sources
FIVER – Robust Verification of Countermeasures against Fault Injections
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann +4 more
doaj +1 more source
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
In recent years, smartphones have become an increasingly important storage facility for personal sensitive data ranging from photos and credentials up to financial and medical records like credit cards and person’s diseases.
Oleksiy Lisovets +3 more
doaj +1 more source
Automated Generation of Masked Hardware
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, protecting against physical side-channel attacks. Even though many different masking schemes have been presented over time, design and implementation of ...
David Knichel +3 more
doaj +1 more source
PROBLEMS AND SOLUTIONS FOR IMPLEMENTATION OF "ONLINE DEPOSITS" IN INDONESIA: DESCRIPTION ANALYSIS [PDF]
Banking digitalization is an effort to continue to innovate to provide various facilities and conveniences for customers when conducting financial transactions through their smartphones.
Santi Pisi, Girang Permata Gusti
doaj +1 more source
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz +9 more
doaj +1 more source
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations.
Jakob Feldtkeller +4 more
doaj +3 more sources
Generic Hardware Private Circuits
With an increasing number of mobile devices and their high accessibility, protecting the implementation of cryptographic functions in the presence of physical adversaries has become more relevant than ever.
David Knichel +2 more
doaj +1 more source
Risky Translations: Securing TLBs against Timing Side Channels
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz +3 more
doaj +1 more source
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks.
Jannik Zeitschner +2 more
doaj +1 more source

