Results 1 to 10 of about 1,445,629 (248)
Side Channel Analysis of SPECK Based on Transfer Learning. [PDF]
Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully.
Zhang Q, Zhang H, Cui X, Fang X, Wang X.
europepmc +4 more sources
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and has a suite of utilities to analyze this.
E. P. de Vink, J.I. den Hartog
openaire +13 more sources
Side Channel Analysis on Bitsliced AES [PDF]
The current power analysis attacks on bitsliced AES only take into account the power consumption of a single bit. We present a way of combining multiple Differential Power Analysis attacks using different power models to target multiple bits. The new attacks require less than half the amount of traces to reach a success rate of 99% compared to the ...
Husum, Stian Johannesen
openaire +3 more sources
Analysis of the algebraic side channel attack [PDF]
At CHES 2009, Renauld, Standaert and Veyrat-Charvillon introduced a new kind of attack called Algebraic Side-Channel Attacks (ASCA). They showed that side-channel information leads to effective algebraic attacks. These results are mostly experiments strongly based on a the use of a SAT-solver.
Jean-Charles Faugère+4 more
openaire +6 more sources
Polynomial Evaluation and Side Channel Analysis [PDF]
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire +6 more sources
On XTR and Side-Channel Analysis [PDF]
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire +2 more sources
DifFuzz: Differential Fuzzing for Side-Channel Analysis [PDF]
This summary is based on our research results on ``DifFuzz: Differential Fuzzing for Side-Channel Analysis'' which was published in the proceedings of the 41st International Conference on Software Engineering. Side-channel analysis aims to investigate the risk that a potential attacker can infer any secret information through observations of the system,
Yannic Noller+2 more
openaire +3 more sources
Deep Learning-based Side Channel Attack on HMAC SM3 [PDF]
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Jin, Xin+3 more
core +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal+2 more
core +2 more sources
Investment cost channel and monetary transmission [PDF]
We show that a standard DSGE model with investment cost channels has important model stability and policy implications. Our analysis suggests that in economies characterized by supply side well as demand side channels of monetary transmission ...
Aksoy, Yunus+2 more
core +3 more sources