Results 1 to 10 of about 2,364,158 (363)
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis [PDF]
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha+2 more
doaj +3 more sources
Side Channel Analysis of SPECK Based on Transfer Learning [PDF]
Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully.
Qingqing Zhang+4 more
doaj +4 more sources
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and
Jerry den Hartog, E.P. de Vink
core +14 more sources
Side channel analysis based on feature fusion network. [PDF]
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys.
Feng Ni+4 more
doaj +2 more sources
Cross subkey side channel analysis based on small samples [PDF]
The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operations only related to the target subkey.
Fanliang Hu, Huanyu Wang, Junnian Wang
doaj +2 more sources
Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing [PDF]
The traces used in side-channel analysis are essential to breaking the key of encryption and the signal quality greatly affects the correct rate of key guessing.
Yuanzhen Wang+7 more
doaj +2 more sources
Weakly Profiling Side-channel Analysis [PDF]
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling.
Lichao Wu+2 more
doaj +2 more sources
Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Elia Bisi+2 more
openalex +6 more sources
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world.
Mauro Conti+3 more
openalex +4 more sources
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more
Karlo Knezevic+4 more
doaj +6 more sources