Results 211 to 220 of about 1,445,629 (248)
Some of the next articles are maybe not open access.
Timing side channels for traffic analysis
2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013Traffic analysis often requires direct observations of network connections at local vantage points. In this work, we show that traffic analysis can be performed remotely by taking advantage of a timing side channel. The timing side channel results from a shared resource, namely, the scheduler between two users.
Negar Kiyavash, Xun Gong
openaire +2 more sources
Deep Learning on Side-Channel Analysis
2022Item does not contain ...
Krček, M.+6 more
openaire +2 more sources
An overview of side channel analysis attacks
Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008During the last ten years, power analysis attacks have been widely developed under many forms. They analyze the relation between the power consumption or electromagnetic radiation of a cryptographic device and the handled data during cryptographic operations.
Thanh-Ha Le+2 more
openaire +2 more sources
Side-Channel Analysis of MAC-Keccak
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Patrick Schaumont, Mostafa Taha
openaire +2 more sources
Side channel analysis on android smartphones
2016 24th Signal Processing and Communication Application Conference (SIU), 2016In recent years, smartphones have become inseparable components of people's daily life. However, the great popularity of smartphones causes some security problems. For example, users may store their contact lists, passwords and other credentials in their smartphones.
Emin Anarim+3 more
openaire +2 more sources
Fuzzy analysis of side channel information
2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS), 2014Cryptographic algorithms implemented inside embedded systems have been designed to guarantee the security of data transition, but these electronic devices can be vulnerable to different class of attacks, mostly side channel attacks. Over the last decade, many attacks have been done successfully on different cryptographic algorithms, but these attacks ...
Ehsan Saeedi, Yinan Kong
openaire +2 more sources
Side Channel Analysis Resistant Design Flow
2006 IEEE International Symposium on Circuits and Systems, 2006The threat of side-channel attacks (SCA) is of crucial importance when designing systems with cryptographic hardware or software. The FP6-funded project SCARD enhances the typical micro-chip design flow in order to provide a means for designing side-channel resistant circuits and systems.
Aigner, M+7 more
openaire +3 more sources
Algebraic Side Channel Analysis
2011International ...
Faugère, Jean-Charles+2 more
openaire +3 more sources
Side-Channel Analysis of the TERO PUF
2019Physical Unclonable Functions (PUFs) have the potential to provide a higher level of security for key storage than traditional Non-Volatile Memory (NVM). However, the susceptibility of the PUF primitives to non-invasive Side-Channel Analysis (SCA) is largely unexplored.
Michael Pehl+2 more
openaire +1 more source
Photonic Side-Channel Analysis of Arbiter PUFs
Journal of Cryptology, 2016As intended by its name, physically unclonable functions (PUFs) are considered as an ultimate solution to deal with insecure storage, hardware counterfeiting, and many other security problems. However, many different successful attacks have already revealed vulnerabilities of certain digital intrinsic PUFs.
Tajik, Shahin+8 more
openaire +3 more sources