Results 31 to 40 of about 3,209,774 (327)

Securing Compilation Against Memory Probing [PDF]

open access: yesProceedings of the 13th Workshop on Programming Languages and Analysis for Security, 2018
A common security recommendation is to reduce the in-memory lifetime of secret values, in order to reduce the risk that an attacker can obtain secret data by probing memory. To mitigate this risk, secret values can be overwritten, at source level, after their last use.
Besson, Frédéric   +2 more
openaire   +2 more sources

Provable Secure Parallel Gadgets

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One of the most prominent countermeasures against side-channel attacks is masking, where each intermediate value of the computation is secret shared, thereby
Francesco Berti   +2 more
doaj   +1 more source

On robust strong‐non‐interferent low‐latency multiplications

open access: yesIET Information Security, 2022
The overarching goal of this work is to present new theoretical and practical tools to implement robust−t−probing security. In this work, a low‐latency multiplication gadget that is secure against probing attacks that exploit logic glitches in the ...
Maria Chiara Molteni   +2 more
doaj   +1 more source

A White-Box Masking Scheme Resisting Computational and Algebraic Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by the industry even though the security of these constructions is not well defined ...
Okan Seker   +2 more
doaj   +1 more source

Probing on green long persistent Eu2+/Dy3+ doped Sr3SiAl4O11 emerging phosphor for security applications [PDF]

open access: bronze, 2015
Bipin Kumar Gupta   +5 more
openalex   +2 more sources

Security-aware Physical Design against Trojan Insertion, Frontside Probing, and Fault Injection Attacks

open access: yesACM International Symposium on Physical Design, 2023
The dramatic growth of hardware attacks and the lack of security-concern solutions in design tools lead to severe security problems in modern IC designs. Although many existing countermeasures provide decent protection against security issues, they still
Jhih-Wei Hsu   +4 more
semanticscholar   +1 more source

Transitional Leakage in Theory and Practice

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Accelerated by the increased interconnection of highly accessible devices, the demand for effective and efficient protection of hardware designs against Side-Channel Analysis (SCA) is ever rising, causing its topical relevance to remain immense in both,
Nicolai Müller   +3 more
doaj   +1 more source

Secure Wire Shuffling in the Probing Model [PDF]

open access: yes, 2021
In this paper we describe the first improvement of the wire shuffling countermeasure against side-channel attacks described by Ishai, Sahai and Wagner at Crypto 2003. More precisely, we show how to get worst case statistical security against t probes with running time \({\mathcal O}(t)\) instead of \({\mathcal O}(t \log t)\); our construction is also ...
Coron, Jean-Sébastien   +1 more
openaire   +2 more sources

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection [PDF]

open access: yesIEEE Access, 2023
Enterprise networks that host valuable assets and services are popular and frequent targets of distributed network attacks. In order to cope with the ever-increasing threats, industrial and research communities develop systems and methods to monitor the ...
Minzhao Lyu   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy