Results 11 to 20 of about 3,209,774 (327)

A relation calculus for reasoning about t-probing security [PDF]

open access: hybridJournal of Cryptographic Engineering, 2022
AbstractIn the context of side-channel attacks against cryptographic circuits, t-probing security characterizes the amount of information derivable about sensitive values (e.g., keys) by observing t output/internal values. Non-interference is a useful mathematical tool used by researchers to assess the probing security of a circuit which employs ...
Maria Chiara Molteni, Vittorio Zaccaria
semanticscholar   +4 more sources

Random Probing Security: Verification, Composition, Expansion and New Constructions [PDF]

open access: greenIACR Cryptology ePrint Archive, 2020
The masking countermeasure is among the most powerful countermeasures to counteract side-channel attacks. Leakage models have been exhibited to theoretically reason on the security of such masked implementations. So far, the most widely used leakage model is the probing model defined by Ishai, Sahai, and Wagner at (CRYPTO 2003).
Sonia Belaïd   +4 more
semanticscholar   +6 more sources

An Algebraic Approach for Evaluating Random Probing Security With Application to AES

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems
We employ an algebraic approach to estimate the success rate of a sidechannel adversary attacking secrets of a masked circuit within the Random Probing Model (RPM), where intermediate variables of the implementation leak with a probability p. Our method
Vahid Jahandideh   +2 more
doaj   +4 more sources

garak: A Framework for Security Probing Large Language Models [PDF]

open access: greenarXiv.org
As Large Language Models (LLMs) are deployed and integrated into thousands of applications, the need for scalable evaluation of how models respond to adversarial attacks grows rapidly. However, LLM security is a moving target: models produce unpredictable output, are constantly updated, and the potential adversary is highly diverse: anyone with access ...
Leon Derczynski   +4 more
semanticscholar   +4 more sources

Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
There exists many masking schemes to protect implementations of cryptographic operations against side-channel attacks. It is common practice to analyze the security of these schemes in the probing model, or its variant which takes into account physical ...
Gaëtan Cassiers   +1 more
doaj   +2 more sources

Robust but Relaxed Probing Model

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Masking has become a widely applied and heavily researched method to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.
Nicolai Müller, Amir Moradi
doaj   +2 more sources

Composable Gadgets with Reused Fresh Masks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Albeit its many benefits, masking cryptographic hardware designs has proven to be a non-trivial and error-prone task, even for experienced engineers.
David Knichel, Amir Moradi
doaj   +2 more sources

Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking [PDF]

open access: yesScientific Reports
Recently, Software-Defined Networking (SDN) has emerged as an increasingly popular network paradigm due to its virtualization capabilities and flexibility. However, its robustness in link connectivity is threatened by Link Flooding Attacks (LFAs).
Xiang Li   +3 more
doaj   +2 more sources

Security Probes for Industrial Control Networks

open access: green, 2014
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia da Universidade de ...
Jorge Filipe Barrigas
openalex   +3 more sources

Home - About - Disclaimer - Privacy