Results 271 to 280 of about 3,209,774 (327)
Algebraic Decomposition for Probing Security
The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represent them as polynomials over a binary field and to secure their nonlinear multiplications thanks to a method introduced by Ishai, Sahai and Wagner ...
Claude Carlet +3 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Unifying Freedom and Separation for Tight Probing-Secure Composition
IACR Cryptology ePrint Archive, 2023The masking countermeasure is often analyzed in the probing model. Proving the probing security of large circuits at high masking orders is achieved by composing gadgets that satisfy security definitions such as non-interference (NI), strong non-interference (SNI) or free SNI.
Belaïd, Sonia +3 more
openaire +2 more sources
On Backside Probing Techniques and Their Emerging Security Threats
IEEE Design & Test, 2022Various probing methodologies have been developed in the semiconductor industry to perform failure analysis of an integrated circuit. However, these probing techniques can be misused to launch security attacks and extract sensitive information from the ...
Liton Kumar Biswas +4 more
openaire +2 more sources
INDIANA - Verifying (Random) Probing Security Through Indistinguishability Analysis
IACR Cryptology ePrint ArchiveChristof Beierle +6 more
openaire +2 more sources
Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security
IEEE Transactions on Network Science and Engineering, 2020Internet of Things (IoT) applications have been growing significantly in recent years, however, the security issue has not been well studied in the literature for the IoT ecosystem.
Yuxin Liu +5 more
semanticscholar +1 more source
iPROBE: Internal Shielding Approach for Protecting Against Front-Side and Back-Side Probing Attacks
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023Focused ion beam (FIB) has emerged as one of the most prevalent integrated circuit (IC) editing techniques in the past decade, greatly assisting post-silicon debugging and failure analysis.
Minyan Gao +4 more
semanticscholar +1 more source
Probing the Security of DNA Origami
2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018DNA origami is a method used to program the self-assembly of nanoscale computational systems. The contribution of this paper is to probe the security of a canonical DNA origami that is often reused. The paper describes the techniques we used to design probes whose input targets the origami systems' integrity.
Koehler, Chase +3 more
openaire +2 more sources
DET: Enabling Efficient Probing of IPv6 Active Addresses
IEEE/ACM Transactions on Networking, 2022Fast IPv4 scanning significantly improves network measurement and security research. Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space.
Guanglei Song +7 more
semanticscholar +1 more source
Probe into E-Commerce Security Technology
2009 International Forum on Computer Science-Technology and Applications, 2009Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information,
Ge Qingping, Feng Li, Yang Li
openaire +1 more source
Researchers probe security through obscurity
Communications of the ACM, 2014Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
openaire +1 more source

