Results 11 to 20 of about 3,209,774 (327)
A relation calculus for reasoning about t-probing security [PDF]
AbstractIn the context of side-channel attacks against cryptographic circuits, t-probing security characterizes the amount of information derivable about sensitive values (e.g., keys) by observing t output/internal values. Non-interference is a useful mathematical tool used by researchers to assess the probing security of a circuit which employs ...
Maria Chiara Molteni, Vittorio Zaccaria
semanticscholar +4 more sources
Random Probing Security: Verification, Composition, Expansion and New Constructions [PDF]
The masking countermeasure is among the most powerful countermeasures to counteract side-channel attacks. Leakage models have been exhibited to theoretically reason on the security of such masked implementations. So far, the most widely used leakage model is the probing model defined by Ishai, Sahai, and Wagner at (CRYPTO 2003).
Sonia Belaïd +4 more
semanticscholar +6 more sources
An Algebraic Approach for Evaluating Random Probing Security With Application to AES
We employ an algebraic approach to estimate the success rate of a sidechannel adversary attacking secrets of a masked circuit within the Random Probing Model (RPM), where intermediate variables of the implementation leak with a probability p. Our method
Vahid Jahandideh +2 more
doaj +4 more sources
garak: A Framework for Security Probing Large Language Models [PDF]
As Large Language Models (LLMs) are deployed and integrated into thousands of applications, the need for scalable evaluation of how models respond to adversarial attacks grows rapidly. However, LLM security is a moving target: models produce unpredictable output, are constantly updated, and the potential adversary is highly diverse: anyone with access ...
Leon Derczynski +4 more
semanticscholar +4 more sources
Exploiting Algebraic Structures in Probing Security [PDF]
Maxime Plançon
semanticscholar +3 more sources
There exists many masking schemes to protect implementations of cryptographic operations against side-channel attacks. It is common practice to analyze the security of these schemes in the probing model, or its variant which takes into account physical ...
Gaëtan Cassiers +1 more
doaj +2 more sources
Robust but Relaxed Probing Model
Masking has become a widely applied and heavily researched method to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.
Nicolai Müller, Amir Moradi
doaj +2 more sources
Composable Gadgets with Reused Fresh Masks
Albeit its many benefits, masking cryptographic hardware designs has proven to be a non-trivial and error-prone task, even for experienced engineers.
David Knichel, Amir Moradi
doaj +2 more sources
Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking [PDF]
Recently, Software-Defined Networking (SDN) has emerged as an increasingly popular network paradigm due to its virtualization capabilities and flexibility. However, its robustness in link connectivity is threatened by Link Flooding Attacks (LFAs).
Xiang Li +3 more
doaj +2 more sources
Security Probes for Industrial Control Networks
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia da Universidade de ...
Jorge Filipe Barrigas
openalex +3 more sources

