Results 271 to 280 of about 3,209,774 (327)

Algebraic Decomposition for Probing Security

open access: yesAnnual International Cryptology Conference, 2015
The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represent them as polynomials over a binary field and to secure their nonlinear multiplications thanks to a method introduced by Ishai, Sahai and Wagner ...
Claude Carlet   +3 more
openaire   +2 more sources

Unifying Freedom and Separation for Tight Probing-Secure Composition

IACR Cryptology ePrint Archive, 2023
The masking countermeasure is often analyzed in the probing model. Proving the probing security of large circuits at high masking orders is achieved by composing gadgets that satisfy security definitions such as non-interference (NI), strong non-interference (SNI) or free SNI.
Belaïd, Sonia   +3 more
openaire   +2 more sources

On Backside Probing Techniques and Their Emerging Security Threats

IEEE Design & Test, 2022
Various probing methodologies have been developed in the semiconductor industry to perform failure analysis of an integrated circuit. However, these probing techniques can be misused to launch security attacks and extract sensitive information from the ...
Liton Kumar Biswas   +4 more
openaire   +2 more sources

INDIANA - Verifying (Random) Probing Security Through Indistinguishability Analysis

IACR Cryptology ePrint Archive
Christof Beierle   +6 more
openaire   +2 more sources

Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security

IEEE Transactions on Network Science and Engineering, 2020
Internet of Things (IoT) applications have been growing significantly in recent years, however, the security issue has not been well studied in the literature for the IoT ecosystem.
Yuxin Liu   +5 more
semanticscholar   +1 more source

iPROBE: Internal Shielding Approach for Protecting Against Front-Side and Back-Side Probing Attacks

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
Focused ion beam (FIB) has emerged as one of the most prevalent integrated circuit (IC) editing techniques in the past decade, greatly assisting post-silicon debugging and failure analysis.
Minyan Gao   +4 more
semanticscholar   +1 more source

Probing the Security of DNA Origami

2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018
DNA origami is a method used to program the self-assembly of nanoscale computational systems. The contribution of this paper is to probe the security of a canonical DNA origami that is often reused. The paper describes the techniques we used to design probes whose input targets the origami systems' integrity.
Koehler, Chase   +3 more
openaire   +2 more sources

DET: Enabling Efficient Probing of IPv6 Active Addresses

IEEE/ACM Transactions on Networking, 2022
Fast IPv4 scanning significantly improves network measurement and security research. Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space.
Guanglei Song   +7 more
semanticscholar   +1 more source

Probe into E-Commerce Security Technology

2009 International Forum on Computer Science-Technology and Applications, 2009
Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information,
Ge Qingping, Feng Li, Yang Li
openaire   +1 more source

Researchers probe security through obscurity

Communications of the ACM, 2014
Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
openaire   +1 more source

Home - About - Disclaimer - Privacy