Results 31 to 40 of about 5,942,634 (324)

Side-Channel Protections for Picnic Signatures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC protocol uses preprocessing.
Diego F. Aranha   +6 more
doaj   +1 more source

Side-Channel Masking with Common Shares

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into several shares, and transforms operations into the masked correspondence (called gadget) operating on shares.
Weijia Wang   +4 more
doaj   +1 more source

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure in the chosen ciphertext model (IND-CCA security).
P. Ravi   +3 more
semanticscholar   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman

open access: yesCryptogr., 2020
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical phenomena of a device during operation.
Mark Randolph, William Diehl
semanticscholar   +1 more source

Cache-Timing Attacks on RSA Key Generation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries.
Alejandro Cabrera Aldaya   +3 more
doaj   +1 more source

Exploring Cortex-M Microarchitectural Side Channel Information Leakage

open access: yesIEEE Access, 2021
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge
Alessandro Barenghi   +3 more
doaj   +1 more source

SCAUL: Power Side-Channel Analysis With Unsupervised Learning [PDF]

open access: yesIEEE transactions on computers, 2020
Existing power analysis techniques rely on strong adversary models with prior knowledge of the leakage or training data. We introduce side-channel analysis with unsupervised learning (SCAUL) that can recover the secret key without requiring prior ...
Keyvan Ramezanpour   +2 more
semanticscholar   +1 more source

High-Throughput Cross-Technology Communication via Chip-Level Side Channel

open access: yesApplied Sciences, 2022
Cross-technology Communication (CTC) is a novel technique enabling data transmission among devices equipped with different physical layers in a heterogeneous wireless network.
Cheng Feng, Tian Xia
doaj   +1 more source

Home - About - Disclaimer - Privacy