Results 21 to 30 of about 3,209,774 (327)
Probing strategy-project alignment: The case of the South African Social Security Agency
Public institutions, such as the South African Social Security Agency (SASSA) increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives.
Gerrit Van Der Waldt
doaj +3 more sources
Post-layout Security Evaluation Methodology Against Probing Attacks
Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, there is no methodology to evaluate theoretically the security level of a design or circuit against this ...
Sofıane Takarabt +4 more
openalex +3 more sources
Improving DNS Security Using Active Firewalling with Network Probes [PDF]
The security problems that outbreak network services today are increasing at a dramatic pace especially with the unceasing improvement of network transmission rates and the sheer amount of data exchanged. This translates not only more incidents but also new types of attacks with network incidents becoming more and more frequent.
João Afonso, Pedro Veiga
openalex +3 more sources
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations [PDF]
Cryptographic implementations deployed in real world devices often aim at (provable) security against the powerful class of side-channel attacks while keeping reasonable performances. Last year at Asiacrypt, a new formal verification tool named tightPROVE was put forward to exactly determine whether a masked implementation is secure in the well ...
Belaïd, Sonia +4 more
openaire +3 more sources
A Low Area Probing Detector for Security ICs
In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It allows intercepting secrets from on-chip wires as well as injecting faults for other attacks.
Michael P. Weiner +2 more
openalex +4 more sources
Real-World Snapshots vs. Theory: Questioning the t-Probing Security\n Model [PDF]
Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs).
Thilo Krachenfels +4 more
semanticscholar +5 more sources
A Low Area Probing Detector for Power Efficient Security ICs
In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It allows intercepting secrets from on-chip wires as well as injecting faults for other attacks.
Weiner, Michael +2 more
openaire +3 more sources
Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature technologies.
Nicolai Müller, Amir Moradi
doaj +3 more sources
Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities.
Happy Mathew Tirivangasi
openalex +3 more sources
Quantile: Quantifying Information Leakage
The masking countermeasure is very effective against side-channel attacks such as differential power analysis. However, the design of masked circuits is a challenging problem since one has to ensure security while minimizing performance overheads.
Vedad Hadžic +4 more
doaj +1 more source

