Results 31 to 40 of about 5,942,634 (324)
Side-Channel Protections for Picnic Signatures
We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC protocol uses preprocessing.
Diego F. Aranha +6 more
doaj +1 more source
Side-Channel Masking with Common Shares
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into several shares, and transforms operations into the masked correspondence (called gadget) operating on shares.
Weijia Wang +4 more
doaj +1 more source
Deep Learning Side-Channel Collision Attack
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj +1 more source
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure in the chosen ciphertext model (IND-CCA security).
P. Ravi +3 more
semanticscholar +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical phenomena of a device during operation.
Mark Randolph, William Diehl
semanticscholar +1 more source
Cache-Timing Attacks on RSA Key Generation
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries.
Alejandro Cabrera Aldaya +3 more
doaj +1 more source
Exploring Cortex-M Microarchitectural Side Channel Information Leakage
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge
Alessandro Barenghi +3 more
doaj +1 more source
SCAUL: Power Side-Channel Analysis With Unsupervised Learning [PDF]
Existing power analysis techniques rely on strong adversary models with prior knowledge of the leakage or training data. We introduce side-channel analysis with unsupervised learning (SCAUL) that can recover the secret key without requiring prior ...
Keyvan Ramezanpour +2 more
semanticscholar +1 more source
High-Throughput Cross-Technology Communication via Chip-Level Side Channel
Cross-technology Communication (CTC) is a novel technique enabling data transmission among devices equipped with different physical layers in a heterogeneous wireless network.
Cheng Feng, Tian Xia
doaj +1 more source

