Results 11 to 20 of about 4,115,069 (292)
DL-LA: Deep Learning Leakage Assessment
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequently executed tasks.
Thorben Moos, Felix Wegener, Amir Moradi
doaj +1 more source
Security-Informed Safety: If It’s Not Secure, It’s Not Safe [PDF]
Traditionally, safety and security have been treated as separate disciplines, but this position is increasingly becoming untenable and stakeholders are beginning to argue that if it’s not secure, it’s not safe. In this paper we present some of the work we have been doing on “security-informed safety”.
Bloomfield, R. E. +2 more
openaire +4 more sources
Balancing the Leakage Currents in Nanometer CMOS Logic—A Challenging Goal
The imbalance of the currents leaked by CMOS standard cells when different logic values are applied to their inputs can be exploited as a side channel to recover the secrets of cryptographic implementations.
Bijan Fadaeinia +2 more
doaj +1 more source
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz +2 more
doaj +1 more source
The SPEEDY Family of Block Ciphers
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
Gregor Leander +3 more
doaj +1 more source
Shorter Linear Straight-Line Programs for MDS Matrices
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Most previous work concentrated on locally optimizing the multiplication with single matrix elements.
Thorsten Kranz +3 more
doaj +1 more source
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
BIKE is a Key Encapsulation Mechanism selected as an alternate candidate in NIST’s PQC standardization process, in which performance plays a significant role in the third round.
Jan Richter-Brockmann +3 more
doaj +1 more source
Re-Consolidating First-Order Masking Schemes
Application of masking, known as the most robust and reliable countermeasure to side-channel analysis attacks, on various cryptographic algorithms has dedicated a lion’s share of research to itself.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj +3 more sources
Transitional Leakage in Theory and Practice
Accelerated by the increased interconnection of highly accessible devices, the demand for effective and efficient protection of hardware designs against Side-Channel Analysis (SCA) is ever rising, causing its topical relevance to remain immense in both,
Nicolai Müller +3 more
doaj +1 more source
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle +3 more
doaj +1 more source

