Results 11 to 20 of about 4,115,069 (292)

DL-LA: Deep Learning Leakage Assessment

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequently executed tasks.
Thorben Moos, Felix Wegener, Amir Moradi
doaj   +1 more source

Security-Informed Safety: If It’s Not Secure, It’s Not Safe [PDF]

open access: yes, 2013
Traditionally, safety and security have been treated as separate disciplines, but this position is increasingly becoming untenable and stakeholders are beginning to argue that if it’s not secure, it’s not safe. In this paper we present some of the work we have been doing on “security-informed safety”.
Bloomfield, R. E.   +2 more
openaire   +4 more sources

Balancing the Leakage Currents in Nanometer CMOS Logic—A Challenging Goal

open access: yesApplied Sciences, 2021
The imbalance of the currents leaked by CMOS standard cells when different logic values are applied to their inputs can be exploited as a side channel to recover the secrets of cryptographic implementations.
Bijan Fadaeinia   +2 more
doaj   +1 more source

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz   +2 more
doaj   +1 more source

The SPEEDY Family of Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
Gregor Leander   +3 more
doaj   +1 more source

Shorter Linear Straight-Line Programs for MDS Matrices

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Most previous work concentrated on locally optimizing the multiplication with single matrix elements.
Thorsten Kranz   +3 more
doaj   +1 more source

Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
BIKE is a Key Encapsulation Mechanism selected as an alternate candidate in NIST’s PQC standardization process, in which performance plays a significant role in the third round.
Jan Richter-Brockmann   +3 more
doaj   +1 more source

Re-Consolidating First-Order Masking Schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Application of masking, known as the most robust and reliable countermeasure to side-channel analysis attacks, on various cryptographic algorithms has dedicated a lion’s share of research to itself.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj   +3 more sources

Transitional Leakage in Theory and Practice

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Accelerated by the increased interconnection of highly accessible devices, the demand for effective and efficient protection of hardware designs against Side-Channel Analysis (SCA) is ever rising, causing its topical relevance to remain immense in both,
Nicolai Müller   +3 more
doaj   +1 more source

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy