Results 21 to 30 of about 3,209,774 (327)

Probing strategy-project alignment: The case of the South African Social Security Agency

open access: goldThe Journal for Transdisciplinary Research in Southern Africa, 2016
Public institutions, such as the South African Social Security Agency (SASSA) increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives.
Gerrit Van Der Waldt
doaj   +3 more sources

Post-layout Security Evaluation Methodology Against Probing Attacks

open access: green, 2021
Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, there is no methodology to evaluate theoretically the security level of a design or circuit against this ...
Sofıane Takarabt   +4 more
openalex   +3 more sources

Improving DNS Security Using Active Firewalling with Network Probes [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2012
The security problems that outbreak network services today are increasing at a dramatic pace especially with the unceasing improvement of network transmission rates and the sheer amount of data exchanged. This translates not only more incidents but also new types of attacks with network incidents becoming more and more frequent.
João Afonso, Pedro Veiga
openalex   +3 more sources

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2020
Cryptographic implementations deployed in real world devices often aim at (provable) security against the powerful class of side-channel attacks while keeping reasonable performances. Last year at Asiacrypt, a new formal verification tool named tightPROVE was put forward to exactly determine whether a masked implementation is secure in the well ...
Belaïd, Sonia   +4 more
openaire   +3 more sources

A Low Area Probing Detector for Security ICs

open access: gold, 2014
In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It allows intercepting secrets from on-chip wires as well as injecting faults for other attacks.
Michael P. Weiner   +2 more
openalex   +4 more sources

Real-World Snapshots vs. Theory: Questioning the t-Probing Security\n Model [PDF]

open access: greenIEEE Symposium on Security and Privacy, 2020
Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs).
Thilo Krachenfels   +4 more
semanticscholar   +5 more sources

A Low Area Probing Detector for Power Efficient Security ICs

open access: yesWorkshop on RFID and IoT Security, 2014
In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It allows intercepting secrets from on-chip wires as well as injecting faults for other attacks.
Weiner, Michael   +2 more
openaire   +3 more sources

PROLEAD

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature technologies.
Nicolai Müller, Amir Moradi
doaj   +3 more sources

Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

open access: goldJamba, 2018
Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities.
Happy Mathew Tirivangasi
openalex   +3 more sources

Quantile: Quantifying Information Leakage

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The masking countermeasure is very effective against side-channel attacks such as differential power analysis. However, the design of masked circuits is a challenging problem since one has to ensure security while minimizing performance overheads.
Vedad Hadžic   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy