Results 1 to 10 of about 373,725 (99)

Weakly Profiling Side-channel Analysis [PDF]

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand, nonprofiling attacks eschew these requirements by trying all key guesses.
Wu, L., Perin, G., Picek, S.
openaire   +4 more sources

Side-channel analysis of SEcube™ platform

open access: yes2017 IEEE East-West Design & Test Symposium (EWDTS), 2017
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo   +3 more
openaire   +2 more sources

Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]

open access: yesIEEE Transactions on Computers, 2017
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire   +2 more sources

Improving Side-Channel Analysis Through Semi-supervised Learning [PDF]

open access: yes, 2019
The profiled side-channel analysis represents the most powerful category of side-channel attacks. In this context, the security evaluator (i.e., attacker) gains access to a profiling device to build a precise model which is used to attack another device in the attacking phase.
Picek, Stjepan   +4 more
openaire   +3 more sources

On XTR and Side-Channel Analysis [PDF]

open access: yes, 2004
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire   +1 more source

Comparison between Side-Channel Analysis Distinguishers [PDF]

open access: yes, 2012
Side-channel analyses allow to extract keys from devices whatever their length. They rely on tools called "distinguishers". In this paper, we intend to compare two generic distinguishers per se: we provide a characterization environment where all the implementation details are equal, hence a fair comparison. In the field of distinguishers that use a
Houssem Maghrebi   +3 more
openaire   +1 more source

Polynomial Evaluation and Side Channel Analysis [PDF]

open access: yes, 2016
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire   +3 more sources

Side channel analysis based on feature fusion network. [PDF]

open access: yesPLoS One, 2022
Ni F, Wang J, Tang J, Yu W, Xu R.
europepmc   +1 more source

Home - About - Disclaimer - Privacy